Skip to main content

Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

  • 1043 Accesses

Abstract

As robustness, stability, and security have been emphasized as the critical success factors of software and systems in the various fields of industry, achieving certification based on a verification of compliance with standards is regarded as the best solution which proves a reliability of product and provides a great marketing tool. Despite such an importance, most developers have scruple about documenting development processes sufficiently. Furthermore, most of software companies try to get a certification after a development of product. As a result, applicants preparing certification are in a quandary about making sufficient materials for certification process. To solve this problem, we present the practical techniques which could be used to recover the details of software design from product and source code in compliance with RTCA/DO-178B and ISO/IEC15408 standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. TNO-ITSEF BV, Arrangement on the Recognition of Common Criteria Certificates in the Field of IT Security Papers (on the web: http://www.commoncriteriaportal.org/public/files/cc-recarrange.pdf ). Netherlands Organization for Applied Scientific Research TNO (Accessed on April 2005)

  2. ISO: Information Technology . Security techniques-Evaluation criteria for IT Security, ISO/IEC 15408. International Standard Organization (1999)

    Google Scholar 

  3. RTCA: Software Considerations in Airborne Systems and Equipment Certification, RTCA/DO-178. Radio Technical Commission for Aeronautics (1992)

    Google Scholar 

  4. Riverson, L., Lingberg, B.: Reverse Engineering of Software Life Cycle Data in Certification Projects. In: The 22nd DASC 2003, vol. 1, pp. 12–16 (2003)

    Google Scholar 

  5. NIST, Common Criteria Evaluation and Validation Scheme (on the web: http://niap.nist.gov/cc-scheme ). Information Technology Laboratory of NIST (Accessed on April 2005)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Kim, S., Choi, M. (2005). Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_89

Download citation

  • DOI: https://doi.org/10.1007/11553939_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics