Software fault tree analysis

https://doi.org/10.1016/0164-1212(83)90030-4Get rights and content

Abstract

With the increased use of software in safety critical systems, software safety has become an important factor in system quality. This paper describes a technique, software fault tree analysis, for the safety analysis of software. The technique interfaces with hardware fault tree analysis to allow the safety of the entire system to be maximized. Experience with the technique and its practicality are discussed.

References (7)

  • R.L. Browning

    The Loss Rate Concept in Safety Engineering

    (1980)
  • S.L. Gerhart et al.

    Observations on the Fallibility in Applications of Modern Programming Methodologies

    IEEE Trans. Software Engin.

    (1976)
  • J.G. Griggs

    A Method of Software Safety Analysis

There are more references available in the full text version of this article.

Cited by (41)

  • Collision detection and resolution of hazard prevention actions in safety critical systems

    2016, Journal of Systems and Software
    Citation Excerpt :

    These studies by and large were focused on the hazard identification and root cause analysis, using certain analysis techniques. The representative techniques include Fault Tree Analysis (FTA) (Leverson and Harvey, 1983a), Failure Mode and Effect Analysis (FMEA) (Snooke and Price, 2011), and Hazard and Operability Analysis (HAZOP) (Redmill et al., 1999). There are also other important techniques, such as Event Tree Analysis (ETA) (Andrews and Dunnett, 2000) and Cause-Consequence Analysis (CCA) (Pauperas and Ridley, 1991), which can be used to identify what kinds of safety actions should be prepared, and to evaluate whether the safety actions can be activated and executed in normal operating conditions.

  • DAG-based attack and defense modeling: Don't miss the forest for the attack trees

    2014, Computer Science Review
    Citation Excerpt :

    A short history of non-security related fault trees was published by Ericson II [146] in 1999. Fault trees have also been used for software analysis [147–150] and were even equated with attack trees by Steffen and Schumacher [36]. In 2003, however, Brooke, and Paige adopted fault trees for security, extending the classical AND–OR structure of attack trees (Section 3.1.1), to include well-known concepts from safety analysis [151].

View all citing articles on Scopus

This work was supported in part by a contract with Hughes Aircraft Company (7-656146-T-DS) and by a joint MICRO grant with the University of California and Hughes Aircraft.

View full text