Skip to main content

Composition of Fault Forests

  • Conference paper
  • First Online:
  • 1247 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12852))

Abstract

Safety analysis is used to ensure that critical systems operate within some level of safety when failures are present. As critical systems become more dependent on software components, it becomes more challenging for safety analysts to comprehensively enumerate all possible failure causation paths. Any automated analyses should be sound to sufficiently prove that the system operates within the designated level of safety. This paper presents a compositional approach to the generation of fault forests (sets of fault trees) and minimal cut sets. We use a behavioral fault model to explore how errors may lead to a failure condition. The analysis is performed per layer of the architecture and the results are automatically composed. A complete formalization is given. We implement this by leveraging minimal inductive validity cores produced by an infinite state model checker. This research provides a sound alternative to a monolithic framework. This enables safety analysts to get a comprehensive enumeration of all applicable fault combinations using a compositional approach while generating artifacts required for certification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. AS5506C: Architecture Analysis & Design Language (AADL), January 2017

    Google Scholar 

  2. Bendík, J., Ghassabani, E., Whalen, M., Černá, I.: Online enumeration of all minimal inductive validity cores. In: Johnsen, E.B., Schaefer, I. (eds.) SEFM 2018. LNCS, vol. 10886, pp. 189–204. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92970-5_12

    Chapter  Google Scholar 

  3. Berezin, S., Campos, S., Clarke, E.M.: Compositional reasoning in model checking. In: de Roever, W.-P., Langmaack, H., Pnueli, A. (eds.) COMPOS 1997. LNCS, vol. 1536, pp. 81–102. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49213-5_4

    Chapter  Google Scholar 

  4. Bieber, P., Castel, C., Seguin, C.: Combination of fault tree analysis and model checking for safety assessment of complex system. In: Bondavalli, A., Thevenod-Fosse, P. (eds.) EDCC 2002. LNCS, vol. 2485, pp. 19–31. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36080-8_3

    Chapter  Google Scholar 

  5. Bittner, B., et al.: The xSAP safety analysis platform. In: TACAS (2016)

    Google Scholar 

  6. Bozzano, M., Bruintjes, H., Cimatti, A., Katoen, J.P., Noll, T., Tonetta, S.: The COMPASS 3.0 toolset. In: IMBSA 2017 (2017)

    Google Scholar 

  7. Bozzano, M., Cimatti, A., Griggio, A., Mattarei, C.: Efficient anytime techniques for model-based safety analysis. In: Kroening, D., Păsăreanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 603–621. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21690-4_41

    Chapter  Google Scholar 

  8. Bozzano, M., et al.: Safety assessment of AltaRica models via symbolic model checking. Sci. Comput. Program. 98, 464–483 (2015)

    Google Scholar 

  9. Bozzano, M., Cimatti, A., Mattarei, C., Tonetta, S.: Formal safety assessment via contract-based design. In: Automated Technology for Verification and Analysis (2014)

    Google Scholar 

  10. Bozzano, M., Cimatti, A., Tapparo, F.: Symbolic fault tree analysis for reactive systems. In: ATVA (2007)

    Google Scholar 

  11. Bryant, R.E.: Graph-based algorithms for Boolean function manipulation. Comput. IEEE Trans. 100(8), 677–691 (1986)

    Article  Google Scholar 

  12. Chen, D., Mahmud, N., Walker, M., Feng, L., Lönn, H., Papadopoulos, Y.: Systems modeling with EAST-ADL for fault tree analysis through HiP-HOPS*. IFAC Proc. Vol. 46(22), 91–96 (2013)

    Google Scholar 

  13. Cofer, D., Gacek, A., Miller, S., Whalen, M.W., LaValley, B., Sha, L.: Compositional verification of architectural models. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 126–140. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28891-3_13

    Chapter  Google Scholar 

  14. De Kleer, J., Williams, B.C.: Diagnosing multiple faults. Artif. Intell. 32(1), 97–130 (1987)

    Google Scholar 

  15. Ericson, C.: Fault tree analysis - a history. In: Proceedings of the 17th International Systems Safety Conference (1999)

    Google Scholar 

  16. Feiler, P., Gluch, D.: Model-Based Engineering with AADL: An Introduction to the SAE Architecture Analysis & Design Language. Addison-Wesley Professional, Boston (2012)

    Google Scholar 

  17. Gacek, A., Backes, J., Whalen, M., Wagner, L., Ghassabani, E.: The JKind model checker. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10982, pp. 20–27. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96142-2_3

    Chapter  Google Scholar 

  18. Gainer-Dewar, A., Vera-Licona, P.: The minimal hitting set generation problem: algorithms and computation. SIAM J. Discrete Math. 31(1), 63–100 (2017)

    Article  MathSciNet  Google Scholar 

  19. Ghassabani, E., Gacek, A., Whalen, M.W.: Efficient generation of inductive validity cores for safety properties. CoRR abs/1603.04276 (2016). http://arxiv.org/abs/1603.04276

  20. Ghassabani, E., Whalen, M.W., Gacek, A.: Efficient generation of all minimal inductive validity cores. In: 2017 Formal Methods in Computer Aided Design (FMCAD), pp. 31–38 (2017)

    Google Scholar 

  21. Gudemann, M., Ortmeier, F.: A framework for qualitative and quantitative formal model-based safety analysis. In: HASE 2010 (2010)

    Google Scholar 

  22. Halbwachs, N., Caspi, P., Raymond, P., Pilaud, D.: The synchronous dataflow programming language lustre. IEEE 79(9), 1305–1320 (1991)

    Article  Google Scholar 

  23. Kahsai, T., Garoche, P.-L., Tinelli, C., Whalen, M.: Incremental verification with mode variable invariants in state machines. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 388–402. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28891-3_35

    Chapter  Google Scholar 

  24. Liffiton, M.H., Previti, A., Malik, A., Marques-Silva, J.: Fast, flexible MUS enumeration. Constraints 21(2), 223–250 (2015). https://doi.org/10.1007/s10601-015-9183-0

    Article  MathSciNet  MATH  Google Scholar 

  25. Murakami, K., Uno, T.: Efficient algorithms for dualizing large-scale hypergraphs. In: 2013 Proceedings of the Fifteenth Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM (2013)

    Google Scholar 

  26. Prosvirnova, T.: AltaRica 3.0: a Model-based approach for safety analyses. Theses, Ecole Polytechnique, November 2014. https://pastel.archives-ouvertes.fr/tel-01119730

  27. Rauzy, A.: New algorithms for fault trees analysis. Reliab. Eng. Syst. Saf. 40(3), 203–211 (1993)

    Article  Google Scholar 

  28. Reiter, R.: A theory of diagnosis from first principles. Artif. Intell. 32(1), 57–95 (1987)

    Article  MathSciNet  Google Scholar 

  29. Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15–16, 29–62 (2015)

    Google Scholar 

  30. SAE ARP4754A: Guidelines for Development of Civil Aircraft and Systems, December 2010

    Google Scholar 

  31. Schäfer, A.: Combining real-time model-checking and fault tree analysis. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 522–541. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45236-2_29

    Chapter  Google Scholar 

  32. Stewart, D., Liu, J., Heimdahl, M., Whalen, M., Cofer, D., Peterson, M.: The safety annex for architecture analysis and design language. In: 10th Edition European Congress Embedded Real Time Systems, January 2020

    Google Scholar 

  33. Stewart, D., Liu, J.J., Cofer, D., Heimdahl, M., Whalen, M.W., Peterson, M.: Aadl-based safety analysis using formal methods applied to aircraft digital systems. Reliab. Eng. Syst. Saf. 213, 107649 (2021). https://doi.org/10.1016/j.ress.2021.107649, https://www.sciencedirect.com/science/article/pii/S0951832021001903

  34. Stewart, D., Whalen, M.W., Cofer, D., Heimdahl, M.P.E.: Architectural modeling and analysis for safety engineering. In: Bozzano, M., Papadopoulos, Y. (eds.) IMBSA 2017. LNCS, vol. 10437, pp. 97–111. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64119-5_7

    Chapter  Google Scholar 

  35. Vesely, W., Goldberg, F., Roberts, N., Haasl, D.: Fault tree handbook. Technical Report, US Nuclear Regulatory Commission (1981)

    Google Scholar 

Download references

Acknowledgments

This research was funded by NASA contract NNL16AB07T and the University of Minnesota College of Science and Engineering Graduate Fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Danielle Stewart .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Stewart, D., Whalen, M., Heimdahl, M., Liu, J.(., Cofer, D. (2021). Composition of Fault Forests. In: Habli, I., Sujan, M., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2021. Lecture Notes in Computer Science(), vol 12852. Springer, Cham. https://doi.org/10.1007/978-3-030-83903-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-83903-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-83902-4

  • Online ISBN: 978-3-030-83903-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics