Abstract
As robustness, stability, and security have been emphasized as the critical success factors of software and systems in the various fields of industry, achieving certification based on a verification of compliance with standards is regarded as the best solution which proves a reliability of product and provides a great marketing tool. Despite such an importance, most developers have scruple about documenting development processes sufficiently. Furthermore, most of software companies try to get a certification after a development of product. As a result, applicants preparing certification are in a quandary about making sufficient materials for certification process. To solve this problem, we present the practical techniques which could be used to recover the details of software design from product and source code in compliance with RTCA/DO-178B and ISO/IEC15408 standards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
TNO-ITSEF BV, Arrangement on the Recognition of Common Criteria Certificates in the Field of IT Security Papers (on the web: http://www.commoncriteriaportal.org/public/files/cc-recarrange.pdf ). Netherlands Organization for Applied Scientific Research TNO (Accessed on April 2005)
ISO: Information Technology . Security techniques-Evaluation criteria for IT Security, ISO/IEC 15408. International Standard Organization (1999)
RTCA: Software Considerations in Airborne Systems and Equipment Certification, RTCA/DO-178. Radio Technical Commission for Aeronautics (1992)
Riverson, L., Lingberg, B.: Reverse Engineering of Software Life Cycle Data in Certification Projects. In: The 22nd DASC 2003, vol. 1, pp. 12–16 (2003)
NIST, Common Criteria Evaluation and Validation Scheme (on the web: http://niap.nist.gov/cc-scheme ). Information Technology Laboratory of NIST (Accessed on April 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Kim, S., Choi, M. (2005). Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_89
Download citation
DOI: https://doi.org/10.1007/11553939_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)