Abstract
Safety critical systems or applications must satisfy safety requirements ensuring that catastrophic consequences of combined component failures are avoided or kept below a satisfying probability threshold. Therefore, designers must define a hardened architecture (or implementation) of each application, which fulfills the required level of safety by integrating redundancy and safety mechanisms. We propose a methodology which, given the nominal functional architecture, uses constraint solving to select automatically a subset of system components to update and appropriate safety patterns to apply to meet safety requirements. The proposed ideas are illustrated on an avionics flight controller case study.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
two components with matching output interfaces are in observationally equivalent states with respect to some formula expressed over their outputs flows if the formula evaluates to true for both components.
- 2.
The minimal sequence set generation tool of the AltaRica tool suite easily allows us to obtain the desired result.
References
Adachi, M., Papadopoulos, Y., Sharvia, S., Parker, D., Tohdo, T.: An approach to optimization of fault tolerant architectures using hip-hops. Softw. Pract. Exper. 41(11), 1303–1327 (2011)
Armoush, A.:. Design patterns for safety-critical embedded systems. Ph.D. thesis (2010)
Arnold, A., Point, G., Griffault, A., Rauzy, A.: The altarica formalism for describing concurrent systems. Fundam. Inform. 40(2–3), 109–124 (1999)
Dassault. Cecilia OCAS framework (2014)
Güdemann, M., Ortmeier, F.: Model-based multi-objective safety optimization. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 423–436. Springer, Heidelberg (2011)
Humbert, S., Seguin, C., Castel, C., Bosc, J.-M.: Deriving safety software requirements from an AltaRica system model. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 320–331. Springer, Heidelberg (2008)
Kehren, C., Seguin, C., Bieber, P., Castel, C., Bougnol, C., Heckmann, J.P., Metge, S.: Architecture patterns for safe design. In: AAAF 1st Complex and Safe Systems Engineering Conference (2004)
Le Berre, D., Parrain, A.: The Sat4j library, release 2.2 system description. J. Satisf. Boolean Model. Comput. 7, 59–64 (2010)
Pagetti, C., Saussié, D., Gratia, R., Noulard, E., Siron, P.: The ROSACE case study: from Simulink specification to multi/many-core execution. In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2014), April 2014
Papadopoulos, Y., Grante, C.: Evolving car designs using model-based automated safety analysis and optimisation techniques. J. Syst. Softw. 76(1), 77–89 (2005)
Preschern, C., Kajtazovic, N., Kreiner, C., et al.: Catalog of safety tactics in the light of the IEC 61508 safety lifecycle. In: Proceedings of VikingPLoP 2013 Conference, p. 79 (2013)
Rugina, A.-E., Feiler, P.H., Kanoun, K., Kaâniche, M.: Software dependability modeling using an industry-standard architecture description language. In: Embedded Systems and Real-Time Systems (ERTS 2008) (2008)
SAE. Aerospace Recommended Practices 4754a - Development of Civil Aircraft and Systems (2010)
Walker, M., Reiser, M.-O., Piergiovanni, S.T., Papadopoulos, Y., Lönn, H., Mraidha, C., Parker, D., Chen, D.-J., Servat, D.: Automatic optimisation of system architectures using east-adl. J. Syst. Softw. 86(10), 2467–2487 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Delmas, K., Delmas, R., Pagetti, C. (2015). Automatic Architecture Hardening Using Safety Patterns. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-24255-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24254-5
Online ISBN: 978-3-319-24255-2
eBook Packages: Computer ScienceComputer Science (R0)