skip to main content
10.1145/316158.316173acmconferencesArticle/Chapter ViewAbstractPublication PagespasteConference Proceedingsconference-collections
Article
Free Access

Safety analysis of Hawk In Flight monitor

Authors Info & Claims
Published:01 September 1999Publication History

ABSTRACT

The development of a military safety critical system has many facets, one of which is the collecting of evidence that can be used to assist the production of the safety case necessary for certification of a system into military use. Within the certification process, static analysis is required by the UK Ministry of Defence to provide evidence of a systems integrity and fitness for purpose. In this paper we describe how we have extended the approach of static analysis to gain evidence of the dynamic integrity of a system. This work, based on the abstract interpretation of variable values into sets of ranges of values, has resulted in the development of a software tool, called the Exception Analyser. This tool can investigate the potential for code, written in C, C++ and Ada, to raise run time exceptions and then derive the system constraints which would prevent these exceptions from occurring. We outline the foundation behind our approach and present the results of a case study into the successful application of the tool on a safety critical military project.

References

  1. Andf99.ANDF TenDRA Software. web site: http://alph.dra.hmg.gb/TenDRA/index.html, 1999 .Google ScholarGoogle Scholar
  2. Bar97.Barnes J. High Integrity Ada: The SPARK Approach. Addison-Wesley Longman, 1997.Google ScholarGoogle Scholar
  3. Bou93.Bourdoncle F. Abstract Debugging of Higher- Order Imperative Languages. Proceedings of SIGPLAN'93 Conference on Programming Language Design and Implementation, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Buc98.Buckle G. Static Analysis of Safety Critical Software (Techniques, Tools and Experiences). Proceedings of the Sixth Safety-Critical Systems Symposium, Birmingham UK, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  5. CG90.Carre B, and Garnsworthy J. Experiences with SPARK and its support tool, the SPARK Examiner. Ada UK Conference, October 1990.Google ScholarGoogle Scholar
  6. CC77.Cousot P, and Cousot R. Abstract Interpretation: A UniJied Lattice Model for Static Analysis of Programs. in Proceedings 4th ACM Symposium on Principals of Programming Languages, POPL77,1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cur98.Currie I. Rationale Behind the Prototype C Analyser. Defence Evaluation Research Agency, Internal Report, DERA/CIS/CIS3/CR97469/1 .O, January 1998.Google ScholarGoogle Scholar
  8. DDC99.DDC-I. Safety Critical Real- World Sofmare Development. web site: http://www.ddci.com, 1999.Google ScholarGoogle Scholar
  9. GH98.Granville R, and Harrison K. Use of Static Code Analysis to Support the Safety CertiJication of Airborne Software. Proceedings of the Sixth Safety-Critical Systems Symposium, Birmingham UK, 1998.Google ScholarGoogle Scholar
  10. IPL99.IPL. Eveleigh House, Grove Street, Bath. http://www.iplbath.com/oOOO.htm. 1999Google ScholarGoogle Scholar
  11. JN95.Jones N.D, and Nielson F. Abstract Interpretation: Semantics-Based Tool for Program Analysis. in Handbook of Logic in Computer Science, Volume 4 Semantic modelling, edited by S.Abramsky, D.M.Gabbay and T.S.E.Maibaum, Clarendon Press, Oxford, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lev95.Leveson N.G SAFEWARE: System Safety and Computers. Addison-Wesley Publishing, 1995. Google ScholarGoogle Scholar
  13. Ldr99.Liverpool Data Research Associates Ltd. 131 Mount Pleasant, Liverpool. http://www.ldra.coml. 1999Google ScholarGoogle Scholar
  14. MIS98.The Motor Industry Software Reliability Association Guidelines for the use of the C Language in Vechicle Based Software MISRA, Nuneaton, Warwickshire, UK, April 1998.Google ScholarGoogle Scholar
  15. MOD91.Ministry of Defence, Directorate of Standardisation, Kentigern House, 65 Brown Street, Glasgow G2 8EX. Interim Defence Standard 00-55. The procurement of safety critical software in Defence equipment, April 1991.Google ScholarGoogle Scholar
  16. Moo66.Moore R.E. Interval Analysis Prentice-Hall, Englewood Cliffs, NJ, 1966Google ScholarGoogle Scholar
  17. OSF91.OSF. ANDF; application portability and open systems. Technical report, Open Software Foundation, 11 Cambridge Center, Cambridge, MA 02142, USA, 1991.Google ScholarGoogle Scholar
  18. Ost81.Osterweil L. Using Data Flow Tools in Software Engineering in: Program Flow Analysis: Theory and Applications, Edited by S.S.Muchnick and N.D.Jones, Prentice-Hall Software Series, 1981.Google ScholarGoogle Scholar
  19. Pal96.Palmer S. MALPAS Executive Overview. TACS/99006/37, TA Constancy Services Limited, UK, 1996.Google ScholarGoogle Scholar
  20. QAC99.QAC. Programming Research Ltd., Glenbrook House, Hersham, Surrey. http:Nwww.prqa.co.uWindex.htm, 1999Google ScholarGoogle Scholar
  21. RTC92.RTCA-DO- 178B. Software considerations in airborne systems and equipment certijcation, December 1992.Google ScholarGoogle Scholar
  22. WCC95.Wichmann B.A, Canning A.A, Clutterbuck D.L, Winsborrow L.A, Ward N.J, and Marsh D.W.R. Industrial Perspective on Static Analysis. Software Engineering Journal, March 1995.Google ScholarGoogle Scholar

Index Terms

  1. Safety analysis of Hawk In Flight monitor

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      PASTE '99: Proceedings of the 1999 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
                      September 1999
                      109 pages
                      ISBN:1581131372
                      DOI:10.1145/316158

                      Copyright © 1999 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 September 1999

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • Article

                      Acceptance Rates

                      PASTE '99 Paper Acceptance Rate8of31submissions,26%Overall Acceptance Rate57of159submissions,36%

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader