Henrik Schiøler

57
Henrik Schiøler Konstruktion, modellering og validering af sikkerhedskritiske SW systemer

description

Konstruktion, modellering og validering af sikkerhedskritiske SW systemer. Henrik Schiøler. Why CISS ?. Increasing demands in electronic equipments for user friendliness, flexibility, small size and weight low power consumption connectivity everywhere at all times - PowerPoint PPT Presentation

Transcript of Henrik Schiøler

Page 1: Henrik Schiøler

Henrik Schiøler

Konstruktion, modellering og validering

af

sikkerhedskritiske SW systemer

Page 2: Henrik Schiøler

2

Why CISS ?

Increasing demands in electronic equipments for user friendliness, flexibility, small size and weight low power consumption connectivity everywhere

at all times

drive the needs for higher levels of software realization !

Page 3: Henrik Schiøler

3

Why CISS ?

This applies not least to portable systems with

wireless communication facilities

as well as medical equipments.

Page 4: Henrik Schiøler

4

Why CISS ?

Application areas mobile and wireless

communication products automotive and avionic

systems consumer electronics (e.g.

audio and video) medico-technical

equipment Building automation smart devices toys and games textiles

Page 5: Henrik Schiøler

5

Who is CISS ?

Institute ofComputer Science

Institute ofComputer Science

Institute ofElectronic Systems

Institute ofElectronic Systems

BRICS@AalborgModelling and Validation;Programming Languages;

Software Engineering

BRICS@AalborgModelling and Validation;Programming Languages;

Software Engineering

Embedded SystemsCommunication;

HW/SWPower Management

Embedded SystemsCommunication;

HW/SWPower Management

Distributed Real Time Systems

Control Theory;Real Time Systems;

Networking.

Distributed Real Time Systems

Control Theory;Real Time Systems;

Networking.

UCb

ICT CompaniesICT Companies

Page 6: Henrik Schiøler

6

Typical Activities

Co-financed R&D projects and case-studies

Industrial training and education

Seminars, workshops and networks of knowledge transfer and exchange

Ph.D. and industrial Ph.D. projects

Visiting Guest researchers Student projects

Page 7: Henrik Schiøler

7

Th

eory

an

d

Th

eory

an

d

Met

hod

olog

yM

eth

odol

ogy

Tec

hn

olog

yT

ech

nol

ogy

Applications, Solutions, BenefitsApplications, Solutions, Benefits

Innovation, Ideas, PervationInnovation, Ideas, Pervation

Page 8: Henrik Schiøler

8

Topics

Page 9: Henrik Schiøler

9

Clusters

Model Based Development of Embedded Software

Intelligent Sensor Networks

Embedded & RT Platform LAB

Safety Critical Software Systems

Embedded System Validation & Testing

HW/SW Co-Design, Design Space Exploration

Page 10: Henrik Schiøler

10

Safety Critical Software SystemsSafety Critical Software Systems

Clusters

Model Based Development of Embedded Software

Intelligent Sensor Networks

Embedded & RT Platform LAB

Embedded System Validation & Testing

HW/SW Co-Design, Design Space Exploration

Safety Critical Software Systems

“THE” CISS Development Handbook

Page 11: Henrik Schiøler

11

SW Development of

Info-tech. Systems

Functional demands

• Development cost/resources

• Time to market

Info-tech. system

Page 12: Henrik Schiøler

12

Embedded systems

Functional demands

• Development cost/resources

• Time to market

Embedded Info-tech. system

Performance demands

• Timeliness

• Reliability

Technological resource bounds

• CPU speed

• Memory

• Power

• Comm. bandwidth

Page 13: Henrik Schiøler

13

Functional Safety

Page 14: Henrik Schiøler

14

Safety Integrity Levels (SIL)

Page 15: Henrik Schiøler

15

Safety Lifecycle

Page 16: Henrik Schiøler

16

Realization

Page 17: Henrik Schiøler

17

SW Safety Lifecycle

Page 18: Henrik Schiøler

18

SW Design and Development

Page 19: Henrik Schiøler

19

Safety Integrity

Page 20: Henrik Schiøler

20

SW Safety Integrity

Page 21: Henrik Schiøler

21

Requirement Specification

Page 22: Henrik Schiøler

22

SW Architectural Design

Page 23: Henrik Schiøler

23

Detailled Design

Page 24: Henrik Schiøler

24

Language and tools

Page 25: Henrik Schiøler

25

Module and IntegrationTesting

Page 26: Henrik Schiøler

26

Integration and Validation

Page 27: Henrik Schiøler

27

Performance modelling

Page 28: Henrik Schiøler

28

Performance Modelling

Page 29: Henrik Schiøler

29

Performance Modelling

• Scheduling Theory

• Timed Petri Nets

• Timed Automata

• Deterministic Network Analysis

Page 30: Henrik Schiøler

30

Scheduling Theory

• Well established

• Covers a variety of scheduling principles; RMA,DMA, EDF,…

• Works for both preemptive and non preemptive scheduling

• Takes critical instants into account; Priority Ceiling.

• Does not cover other IPC patterns, e.g. prod./cons. (message passing)

• Tools available: TimeWIZ, RapidRMA, TIMES, ..

Page 31: Henrik Schiøler

31

Timed Automata

• Well established

• General setup

• Does not directly cover scheduling problems

• Assertions verifiable

• May be computationally intractable – especially for asynchronous communication (message passing)

• Tools available: UPPAAL, Kronos, ..

Page 32: Henrik Schiøler

32

Timed Petri Nets• Well established

• Mentioned in 61508

• Very general

• Assertions hardly verifiable for other than D-nets, M-nets

• Tools available: TPN-tools, TimeNET

Page 33: Henrik Schiøler

33

Deterministic Network Calculus

• Well established for buffer and delay dimensioning in network communication

• May be used for modelling message-passing in real time systems – transaction response times

• Abstract, overapproximating, conservative (good for safety ?)

• Computationally tractable

• Min/Plus, Max/Plus filtering theory

• Tools available: ??

Page 34: Henrik Schiøler

UPPAALUPPAAL

Modelling and Verification of Real Time systems

UPPAAL2k > 2000 users > 45 countries

UPPAAL2k > 2000 users > 45 countries

See www.uppaal.com

!!!!

See www.uppaal.com

!!!!

Page 35: Henrik Schiøler

35

Timed Automata

n

m

a

Alur & Dill 1990

Clocks: x, y

x<=5 & y>3

x := 0

Guard Boolean combination of integer boundson clocks and clock-differences.

ResetAction perfomed on clocks

Transitions

( n , x=2.4 , y=3.1415 ) ( n , x=3.5 , y=4.2415 )

e(1.1)

( n , x=2.4 , y=3.1415 ) ( m , x=0 , y=3.1415 )

a

State ( location , x=v , y=u ) where v,u are in R

Actionused

for synchronization

Page 36: Henrik Schiøler

36

Cruise ControlWhen the car ignition is switched on and the on button is pressed, the current speed is recorded and the system is enabled: it maintains the speed of the car at the recorded setting.

Pressing the brake, accelerator or off button disables the system. Pressing resume or on re-enables the system.

buttons

Page 37: Henrik Schiøler

37

Model Structure

The CONTROL system is structured as two processes.

The main actions and interactions are as shown.

The CONTROL system is structured as two processes.

The main actions and interactions are as shown.

CruiseControl

CruiseControl

SpeedControl

SpeedControl

UserUser

EngineEngine

engineOnengineOffonoffresumebrakeaccelerator clearSpeed

recordSpeedenablecontroldisablecontrol

dSpeedcSpeedacc

Page 38: Henrik Schiøler

38

UserUser EngineEngine

Page 39: Henrik Schiøler

39

The CARA System

Computer Assisted Resuscitation System

Purpose: automate delivery of intravenous fluids to injured persons in catastrophic situations

Comprises: software to: monitor patient’s blood pressure control a high-output infusion pump

Page 40: Henrik Schiøler

40

System Structure

Page 41: Henrik Schiøler

41

UPPAAL model

Page 42: Henrik Schiøler

42

Traditional Software Development

The Waterfall Model

Analyse

Design

Implementation

Testing Costly in time-to-market and money Errors are detected late or never Application of FM’s as early as possible

ProblemArea

Runni

ng

Syst

em

REVI

EWS

REVI

EWS

Page 43: Henrik Schiøler

43

Modelbased Validation

Design Model SpecificationVerification & Refusal

AnalysisValidation

FORMAL

METHODS

Implementation

Testing

UML

Page 44: Henrik Schiøler

44

Modelbased Validation

Design Model SpecificationVerification & Refusal

AnalysisValidation

FORMAL

METHODS

Implementation

Testing

UML

AutomaticCode generation

Page 45: Henrik Schiøler

45

Modelbased Validation

Design Model SpecificationVerification & Refusal

AnalysisValidation

FORMAL

METHODS

Implementation

Testing

UML

AutomaticCode generation

AutomaticTest generation

Page 46: Henrik Schiøler

46

Safety Research Activities

• Model based validation (UPPAAL) (K. G. Larsen, A. Skou)

• Model based testing (B. Nielsen)

• Realiable control systems (J. Stoustrup)

• Structural analysis for complex systems (R. I-Zamanabadi)

• Impact of Scheduling Policies on Controller Performance (H. Schiøler, A. P. Ravn, J. Dalsgaard)

• Reliability Resource Reservation Protocol (RRSVP) (H. Schiøler)

Page 47: Henrik Schiøler

47

Control Systems

Page 48: Henrik Schiøler

48

Reliable (Fault tolerant) Control

Page 49: Henrik Schiøler

49

Reliable (Fault tolerant) Control

Page 50: Henrik Schiøler

50

Reliable (Fault tolerant) Control

Page 51: Henrik Schiøler

51

Structural Analysis

Problem:Given a system, consisting of a set of components,we would like to develope a method to analyse thesystem and determine the possibility of detecting different faults under the following conditions,

• System parameters are not known• Linear as well as nonlinear dynamics• Complexity (large systems)

Page 52: Henrik Schiøler

52

Structural model representation

Consider the system as a set of components, each imposing a relation ,fi between a set of variables zj.

fiz1 zp

System:

Page 53: Henrik Schiøler

53

Structural model representation 2

Systems structural graph is a tripartite directed graph:

x1

y2 y3y1

f1 f3f2 f4 f5 f6 f7 f8 f9 f10

x2 x3 x4 x5 x6 x7

u2u1

Page 54: Henrik Schiøler

54

Matching concept

The main purpose of developing a matching algorithm is to identify the over-determined part of the system.

Kf1f2

f3

f4f5

x 1x 2

x 3x 4

The principle of matching algorithm:

Page 55: Henrik Schiøler

55

Design Tool for Structural Analysis (DTSA)

Page 56: Henrik Schiøler

56

DTSA

Page 57: Henrik Schiøler

57

Contact Info

• http://ciss.auc.dk (hjemmeside)

[email protected] (Kim G. Larsen, leder)

[email protected] (Henrik Schiøler, m.f.u)

[email protected] (Peter Koch, m.f.u)

[email protected] (Arne Skou, m.f.u)