Abstract
Safety critical systems or applications must satisfy safety requirements ensuring that catastrophic consequences of combined component failures are avoided or kept below a satisfying probability threshold. Therefore, designers must define a hardened architecture (or implementation) of each application, which fulfills the required level of safety by integrating redundancy and safety mechanisms. We propose a methodology which, given the nominal functional architecture, uses constraint solving to select automatically a subset of system components to update and appropriate safety patterns to apply to meet safety requirements. The proposed ideas are illustrated on an avionics flight controller case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
two components with matching output interfaces are in observationally equivalent states with respect to some formula expressed over their outputs flows if the formula evaluates to true for both components.
- 2.
The minimal sequence set generation tool of the AltaRica tool suite easily allows us to obtain the desired result.
References
Adachi, M., Papadopoulos, Y., Sharvia, S., Parker, D., Tohdo, T.: An approach to optimization of fault tolerant architectures using hip-hops. Softw. Pract. Exper. 41(11), 1303–1327 (2011)
Armoush, A.:. Design patterns for safety-critical embedded systems. Ph.D. thesis (2010)
Arnold, A., Point, G., Griffault, A., Rauzy, A.: The altarica formalism for describing concurrent systems. Fundam. Inform. 40(2–3), 109–124 (1999)
Dassault. Cecilia OCAS framework (2014)
GĂ¼demann, M., Ortmeier, F.: Model-based multi-objective safety optimization. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 423–436. Springer, Heidelberg (2011)
Humbert, S., Seguin, C., Castel, C., Bosc, J.-M.: Deriving safety software requirements from an AltaRica system model. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 320–331. Springer, Heidelberg (2008)
Kehren, C., Seguin, C., Bieber, P., Castel, C., Bougnol, C., Heckmann, J.P., Metge, S.: Architecture patterns for safe design. In: AAAF 1st Complex and Safe Systems Engineering Conference (2004)
Le Berre, D., Parrain, A.: The Sat4j library, release 2.2 system description. J. Satisf. Boolean Model. Comput. 7, 59–64 (2010)
Pagetti, C., Saussié, D., Gratia, R., Noulard, E., Siron, P.: The ROSACE case study: from Simulink specification to multi/many-core execution. In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2014), April 2014
Papadopoulos, Y., Grante, C.: Evolving car designs using model-based automated safety analysis and optimisation techniques. J. Syst. Softw. 76(1), 77–89 (2005)
Preschern, C., Kajtazovic, N., Kreiner, C., et al.: Catalog of safety tactics in the light of the IEC 61508 safety lifecycle. In: Proceedings of VikingPLoP 2013 Conference, p. 79 (2013)
Rugina, A.-E., Feiler, P.H., Kanoun, K., KaĂ¢niche, M.: Software dependability modeling using an industry-standard architecture description language. In: Embedded Systems and Real-Time Systems (ERTS 2008) (2008)
SAE. Aerospace Recommended Practices 4754a - Development of Civil Aircraft and Systems (2010)
Walker, M., Reiser, M.-O., Piergiovanni, S.T., Papadopoulos, Y., Lönn, H., Mraidha, C., Parker, D., Chen, D.-J., Servat, D.: Automatic optimisation of system architectures using east-adl. J. Syst. Softw. 86(10), 2467–2487 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Delmas, K., Delmas, R., Pagetti, C. (2015). Automatic Architecture Hardening Using Safety Patterns. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-24255-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24254-5
Online ISBN: 978-3-319-24255-2
eBook Packages: Computer ScienceComputer Science (R0)