Formalization and Validation of Safety-Critical Requirements

被引:3
|
作者
Cimatti, Alessandro [1 ]
Roveri, Marco [1 ]
Susi, Angelo [1 ]
Tonetta, Stefano [1 ]
机构
[1] FBK Irst, Trento, Italy
关键词
D O I
10.4204/EPTCS.20.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The validation of requirements is a fundamental step in the development process of safety-critical systems. In safety critical applications such as aerospace, avionics and railways, the use of formal methods is of paramount importance both for requirements and for design validation. Nevertheless, while for the verification of the design, many formal techniques have been conceived and applied, the research on formal methods for requirements validation is not yet mature. The main obstacles are that, on the one hand, the correctness of requirements is not formally defined; on the other hand that the formalization and the validation of the requirements usually demands a strong involvement of domain experts. We report on a methodology and a series of techniques that we developed for the formalization and validation of high-level requirements for safety-critical applications. The main ingredients are a very expressive formal language and automatic satisfiability procedures. The language combines first-order, temporal, and hybrid logic. The satisfiability procedures are based on model checking and satisfiability modulo theory. We applied this technology within an industrial project to the validation of railways requirements.
引用
收藏
页码:68 / 75
页数:8
相关论文
共 50 条
  • [1] Formalization and assessment of regulatory requirements for safety-critical software
    Vilkomir, Sergiy A.
    Bowen, Jonathan P.
    Ghose, Aditya K.
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2006, 2 (3-4) : 165 - 178
  • [2] Verification of requirements for safety-critical software
    Carpenter, PB
    [J]. ACM SIGADA ANNUAL INTERNATIONAL CONFERENCE (SIGADA'99) - PROCEEDINGS, 1999, 19 (03): : 23 - 29
  • [3] Ontology-based Requirements Generation for Credibility Validation of Safety-critical System
    Li, Rui
    Ma, Shilong
    Yao, Wentao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 849 - 854
  • [4] A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems
    Zhou, Jiale
    Lu, Yue
    Lundqvist, Kristina
    [J]. RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2014, 2014, 8454 : 43 - 57
  • [5] ON THE SAFETY ANALYSIS OF REQUIREMENTS SPECIFICATIONS FOR SAFETY-CRITICAL SOFTWARE
    SAEED, A
    DELEMOS, R
    ANDERSON, T
    [J]. ISA TRANSACTIONS, 1995, 34 (03) : 283 - 295
  • [6] ANALYSIS OF TIMELINESS REQUIREMENTS IN SAFETY-CRITICAL SYSTEMS
    DELEMOS, R
    SAEED, A
    ANDERSON, T
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 571 : 171 - 192
  • [7] Requirements Engineering for Safety-Critical Molecular Programs
    Lutz, Robyn R.
    [J]. 2022 30TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2022), 2022, : 302 - 308
  • [8] Executable requirements in a safety-critical context with Ada
    Bâillon, Christophe
    Bouchez-Mongardé, Shanti
    [J]. Ada User Journal, 2010, 31 (02): : 131 - 135
  • [9] Operational anomalies as a cause of safety-critical requirements evolution
    Lutz, RR
    Mikulski, IC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 65 (02) : 155 - 161
  • [10] Deriving architectural flexibility requirements in safety-critical systems
    Stephenson, Z
    McDermid, J
    [J]. IEE PROCEEDINGS-SOFTWARE, 2005, 152 (04): : 143 - 152