首页 > 最新文献

Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering最新文献

英文 中文
Toward the automatic assessment of evolvability for reusable class libraries 对可重用类库的可演化性进行自动评估
H. Sahraoui, H. Lounis, M. Boukadoum, Frédéric Ethève
Many sources agree that managing the evolution of an OO system constitutes a complex and resource-consuming task. This is particularly true for reusable class libraries, as the user interface must be preserved to allow for version compatibility. Thus, the symptomatic detection of potential instabilities during the design phase of such libraries may serve to avoid later problems. This paper presents a fuzzy logic-based approach for evaluating the interface stability of a reusable class library, by using structural metrics as stability indicators.
许多来源都认为,管理OO系统的演化是一项复杂且消耗资源的任务。对于可重用的类库尤其如此,因为必须保留用户界面以允许版本兼容性。因此,在这些库的设计阶段对症检测潜在的不稳定性可能有助于避免以后的问题。本文提出了一种基于模糊逻辑的可重用类库接口稳定性评价方法,以结构度量作为稳定性指标。
{"title":"Toward the automatic assessment of evolvability for reusable class libraries","authors":"H. Sahraoui, H. Lounis, M. Boukadoum, Frédéric Ethève","doi":"10.1109/ASE.2000.873680","DOIUrl":"https://doi.org/10.1109/ASE.2000.873680","url":null,"abstract":"Many sources agree that managing the evolution of an OO system constitutes a complex and resource-consuming task. This is particularly true for reusable class libraries, as the user interface must be preserved to allow for version compatibility. Thus, the symptomatic detection of potential instabilities during the design phase of such libraries may serve to avoid later problems. This paper presents a fuzzy logic-based approach for evaluating the interface stability of a reusable class library, by using structural metrics as stability indicators.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127355362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating test data for branch coverage 为分支覆盖率生成测试数据
Neelam Gupta, A. Mathur, M. Soffa
Branch coverage is an important criteria used during the structural testing of programs. We present a new program execution based approach to generate input data that exercises a selected branch in a program. The test data generation is initiated with an arbitrarily chosen input from the input domain of the program. A new input is derived from the initial input in an attempt to force execution through any of the paths through the selected branch. The method dynamically switches among the paths that reach the branch by refining the input. Using a numerical iterative technique that attempts to generate an input to exercise the branch, it dynamically selects a path that offers less resistance. We have implemented the technique and present experimental results of its performance for some programs. Our results show that our method is feasible and practical.
分支覆盖率是程序结构测试中使用的一个重要标准。我们提出了一种新的基于程序执行的方法来生成在程序中执行选定分支的输入数据。测试数据生成是由程序输入域中任意选择的输入开始的。从初始输入派生出一个新输入,试图通过选定分支的任何路径强制执行。该方法通过细化输入,在到达分支的路径之间动态切换。它使用一种数值迭代技术,试图生成一个输入来练习分支,它动态地选择一条阻力较小的路径。我们已经实现了该技术,并给出了一些程序的性能实验结果。结果表明,该方法是可行的、实用的。
{"title":"Generating test data for branch coverage","authors":"Neelam Gupta, A. Mathur, M. Soffa","doi":"10.1109/ASE.2000.873666","DOIUrl":"https://doi.org/10.1109/ASE.2000.873666","url":null,"abstract":"Branch coverage is an important criteria used during the structural testing of programs. We present a new program execution based approach to generate input data that exercises a selected branch in a program. The test data generation is initiated with an arbitrarily chosen input from the input domain of the program. A new input is derived from the initial input in an attempt to force execution through any of the paths through the selected branch. The method dynamically switches among the paths that reach the branch by refining the input. Using a numerical iterative technique that attempts to generate an input to exercise the branch, it dynamically selects a path that offers less resistance. We have implemented the technique and present experimental results of its performance for some programs. Our results show that our method is feasible and practical.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
A DSL approach to improve productivity and safety in device drivers development 一种DSL方法,用于提高设备驱动程序开发的生产率和安全性
Laurent Réveillère, Fabrice Mérillon, C. Consel, R. Marlet, Gilles Muller
Although new peripheral devices are emerging at a frantic pace and require the fast release of drivers, little progress has been made to improve the development of such device drivers. Too often, this development consists of decoding hardware intricacies, based on inaccurate documentation. Then, assembly-level operations need to be used to interact with the device. These low-level operations reduce the readability of the driver and prevent safety properties from being checked. This paper presents an approach based on domain-specific languages (DSLs) to overcome these problems. We define a language, named Devil (DEVice Interaction Language), dedicated to defining the basic communication with a device. Unlike a general-purpose language, Devil allows a description to be checked for consistency. This not only improves the safety of the interaction with the device but also uncovers bugs early in the development process. To asses our approach, we have shown that Devil is expressive enough to specify a large number of devices. To evaluate productivity and safety improvements over traditional development in C, we report an experiment based on mutation testing.
尽管新的外围设备以疯狂的速度出现,并要求快速发布驱动程序,但在改进这些设备驱动程序的开发方面进展甚微。通常,这种开发包括解码硬件的复杂性,基于不准确的文档。然后,需要使用汇编级操作来与设备进行交互。这些低级操作降低了驱动程序的可读性,并阻止了对安全属性的检查。本文提出了一种基于领域特定语言(dsl)的方法来克服这些问题。我们定义了一种名为Devil(设备交互语言)的语言,专门用于定义与设备的基本通信。与通用语言不同,Devil允许检查描述的一致性。这不仅可以提高与设备交互的安全性,还可以在开发过程的早期发现漏洞。为了评估我们的方法,我们展示了Devil具有足够的表现力,可以指定大量的设备。为了评估C语言传统开发的生产力和安全性改进,我们报告了一个基于突变测试的实验。
{"title":"A DSL approach to improve productivity and safety in device drivers development","authors":"Laurent Réveillère, Fabrice Mérillon, C. Consel, R. Marlet, Gilles Muller","doi":"10.1109/ASE.2000.873655","DOIUrl":"https://doi.org/10.1109/ASE.2000.873655","url":null,"abstract":"Although new peripheral devices are emerging at a frantic pace and require the fast release of drivers, little progress has been made to improve the development of such device drivers. Too often, this development consists of decoding hardware intricacies, based on inaccurate documentation. Then, assembly-level operations need to be used to interact with the device. These low-level operations reduce the readability of the driver and prevent safety properties from being checked. This paper presents an approach based on domain-specific languages (DSLs) to overcome these problems. We define a language, named Devil (DEVice Interaction Language), dedicated to defining the basic communication with a device. Unlike a general-purpose language, Devil allows a description to be checked for consistency. This not only improves the safety of the interaction with the device but also uncovers bugs early in the development process. To asses our approach, we have shown that Devil is expressive enough to specify a large number of devices. To evaluate productivity and safety improvements over traditional development in C, we report an experiment based on mutation testing.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Using Little-JIL to coordinate agents in software engineering 用Little-JIL协调软件工程中的代理
A. Wise, A. Cass, Barbara Lerner, E. K. McCall, L. Osterweil, S. Sutton
Little-JIL, a new language for programming the coordination of agents, is an executable, high-level process programming language with a formal (yet graphical) syntax and rigorously defined operational semantics. Little-JIL is based on two main hypotheses. The first is that the specification of coordination control structures is separable from other process programming language issues. Little-JIL provides a rich set of control structures while relying on separate systems for support in areas such as resource, artifact and agenda management. The second hypothesis is that processes can be executed by agents who know how to perform their tasks but can benefit from coordination support. Accordingly, each step in Little-JIl is assigned to an execution agent (human or automated). These agents are responsible for initiating steps and performing the work associated with them. This approach has so far proven effective in allowing us to clearly and concisely express the agent coordination aspects of a wide variety of software, workflow and other processes.
Little-JIL是一种用于对代理进行协调编程的新语言,它是一种可执行的高级流程编程语言,具有形式化(但图形化)语法和严格定义的操作语义。Little-JIL基于两个主要假设。首先,协调控制结构的规范与其他过程编程语言问题是可分离的。Little-JIL提供了一套丰富的控制结构,同时依靠独立的系统在资源、工件和议程管理等领域提供支持。第二个假设是,流程可以由知道如何执行任务的代理执行,并且可以从协调支持中获益。相应地,Little-JIl中的每个步骤都分配给执行代理(人工或自动)。这些代理负责启动步骤并执行与之相关的工作。到目前为止,这种方法已经被证明是有效的,它允许我们清晰而简洁地表达各种软件、工作流和其他过程的代理协调方面。
{"title":"Using Little-JIL to coordinate agents in software engineering","authors":"A. Wise, A. Cass, Barbara Lerner, E. K. McCall, L. Osterweil, S. Sutton","doi":"10.1109/ASE.2000.873660","DOIUrl":"https://doi.org/10.1109/ASE.2000.873660","url":null,"abstract":"Little-JIL, a new language for programming the coordination of agents, is an executable, high-level process programming language with a formal (yet graphical) syntax and rigorously defined operational semantics. Little-JIL is based on two main hypotheses. The first is that the specification of coordination control structures is separable from other process programming language issues. Little-JIL provides a rich set of control structures while relying on separate systems for support in areas such as resource, artifact and agenda management. The second hypothesis is that processes can be executed by agents who know how to perform their tasks but can benefit from coordination support. Accordingly, each step in Little-JIl is assigned to an execution agent (human or automated). These agents are responsible for initiating steps and performing the work associated with them. This approach has so far proven effective in allowing us to clearly and concisely express the agent coordination aspects of a wide variety of software, workflow and other processes.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Semantic abstraction rules for class diagrams 类图的语义抽象规则
Alexander Egyed
When dealing with object-oriented models like class and object diagrams, designers easily get overwhelmed by large numbers of model elements and their interdependencies. To deal with the complexities of large-scale software models, this paper presents rules and methods for automated abstraction. Our approach is tool supported and allows designers to periodically "zoom out" of a model to investigate and reason about its bigger picture. Our technique has also proven to be well-suited for consistency checking and reverse engineering.
当处理像类和对象图这样的面向对象模型时,设计人员很容易被大量的模型元素及其相互依赖关系所淹没。针对大规模软件模型的复杂性,提出了自动化抽象的规则和方法。我们的方法是工具支持的,允许设计师定期“缩小”模型,以调查和推理其更大的图景。我们的技术也被证明非常适合一致性检查和逆向工程。
{"title":"Semantic abstraction rules for class diagrams","authors":"Alexander Egyed","doi":"10.1109/ASE.2000.873683","DOIUrl":"https://doi.org/10.1109/ASE.2000.873683","url":null,"abstract":"When dealing with object-oriented models like class and object diagrams, designers easily get overwhelmed by large numbers of model elements and their interdependencies. To deal with the complexities of large-scale software models, this paper presents rules and methods for automated abstraction. Our approach is tool supported and allows designers to periodically \"zoom out\" of a model to investigate and reason about its bigger picture. Our technique has also proven to be well-suited for consistency checking and reverse engineering.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123445208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Issues for the automatic generation of safety critical software 自动生成安全关键软件的问题
C. O'Halloran
This paper presents the advantages and disadvantages of automatic code generation of safety critical software. It discusses three broad approaches to its generation in the context of the high levels of assurance required. Finally a number of issues that commercial tool vendors must address are discussed along with consequent research issues that follow.
本文介绍了安全关键软件代码自动生成的优缺点。它讨论了在所需的高水平保证的背景下产生它的三种广泛方法。最后,讨论了一些商业工具供应商必须解决的问题,以及随后的研究问题。
{"title":"Issues for the automatic generation of safety critical software","authors":"C. O'Halloran","doi":"10.1109/ASE.2000.873677","DOIUrl":"https://doi.org/10.1109/ASE.2000.873677","url":null,"abstract":"This paper presents the advantages and disadvantages of automatic code generation of safety critical software. It discusses three broad approaches to its generation in the context of the high levels of assurance required. Finally a number of issues that commercial tool vendors must address are discussed along with consequent research issues that follow.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122962682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automated security checking and patching using TestTalk 使用TestTalk自动进行安全检查和修补
Chang Liu, D. Richardson
In many computer system security incidents, attackers successfully intruded computer systems by exploiting known weaknesses. Those computer systems remained vulnerable even after the vulnerabilities were known because it requires constant attention to stay on top of security updates. It is often both time-consuming and error-prone to manually apply security patches to deployed systems. To solve this problem, we propose to develop a framework for automated security checking and patching. The framework, named Securibot, provides a self-operating mechanism for security checking and patching. Securibot performs security testing using security profiles and security updates. It can also detect compromised systems using attack signatures. Most important, the Securibot framework allows system vendors to publish recently discovered security weaknesses and new patches in a machine-readable form so that the Securibot system running on deployed systems can automatically check out security updates and apply the patches.
在许多计算机系统安全事件中,攻击者利用已知的弱点成功侵入计算机系统。即使在漏洞被发现之后,这些计算机系统仍然容易受到攻击,因为它需要持续关注安全更新。对已部署的系统手动应用安全补丁通常既耗时又容易出错。为了解决这个问题,我们建议开发一个用于自动安全检查和修补的框架。这个名为Securibot的框架为安全检查和修补提供了一种自操作机制。Securibot使用安全配置文件和安全更新执行安全测试。它还可以使用攻击签名检测受损系统。最重要的是,Securibot框架允许系统供应商以机器可读的形式发布最近发现的安全漏洞和新补丁,以便运行在部署系统上的Securibot系统可以自动检查出安全更新并应用补丁。
{"title":"Automated security checking and patching using TestTalk","authors":"Chang Liu, D. Richardson","doi":"10.1109/ASE.2000.873673","DOIUrl":"https://doi.org/10.1109/ASE.2000.873673","url":null,"abstract":"In many computer system security incidents, attackers successfully intruded computer systems by exploiting known weaknesses. Those computer systems remained vulnerable even after the vulnerabilities were known because it requires constant attention to stay on top of security updates. It is often both time-consuming and error-prone to manually apply security patches to deployed systems. To solve this problem, we propose to develop a framework for automated security checking and patching. The framework, named Securibot, provides a self-operating mechanism for security checking and patching. Securibot performs security testing using security profiles and security updates. It can also detect compromised systems using attack signatures. Most important, the Securibot framework allows system vendors to publish recently discovered security weaknesses and new patches in a machine-readable form so that the Securibot system running on deployed systems can automatically check out security updates and apply the patches.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploring and validating the contributions of real-world knowledge to the diagnostic performance of automated database design tools 探索和验证实际知识对自动化数据库设计工具的诊断性能的贡献
S. Noah, M. Williams
Automated database design tools employ knowledge-based systems technology in order to provide intelligent support to humans during the process of database analysis and design. However, the level to which these tools can simulate the diagnostic capabilities of human designers when performing a design task remains in question. Human designers employ what might be called "knowledge of the real world" in carrying their design activities; such knowledge is employed by only a few automated database design tools. Therefore, in recent years, there have been a number of attempts to develop tools that are capable of exploiting such real-world knowledge. It has been claimed that the use of such knowledge has the potential to increase the diagnostic performance of automated database design tools. However, to date, little if any formal exploration and validation of this claim has taken place. This paper presents our activities in exploring and validating the implications for exploiting three approaches facilitating the use and exploitation of real-world knowledge in the diagnostic performance of database design tools. The results obtained have demonstrated that the improvement of certain aspects of diagnostic performance has been achieved. However, the extent to which these aspects have been attained and subsequently statistically validated varies.
自动化数据库设计工具采用基于知识的系统技术,在数据库分析和设计过程中为人类提供智能支持。然而,在执行设计任务时,这些工具能够模拟人类设计师的诊断能力的水平仍然存在问题。人类设计师运用所谓的“真实世界的知识”来进行他们的设计活动;只有少数自动化数据库设计工具使用这些知识。因此,近年来,有许多人尝试开发能够利用这些现实世界知识的工具。有人声称,使用这些知识有可能提高自动化数据库设计工具的诊断性能。然而,到目前为止,对这一说法进行的正式探索和验证很少。本文介绍了我们在探索和验证利用三种方法的影响方面的活动,这些方法有助于在数据库设计工具的诊断性能中使用和利用现实世界的知识。所获得的结果表明,诊断性能的某些方面的改进已经实现。然而,这些方面已经达到的程度以及随后的统计验证程度各不相同。
{"title":"Exploring and validating the contributions of real-world knowledge to the diagnostic performance of automated database design tools","authors":"S. Noah, M. Williams","doi":"10.1109/ASE.2000.873662","DOIUrl":"https://doi.org/10.1109/ASE.2000.873662","url":null,"abstract":"Automated database design tools employ knowledge-based systems technology in order to provide intelligent support to humans during the process of database analysis and design. However, the level to which these tools can simulate the diagnostic capabilities of human designers when performing a design task remains in question. Human designers employ what might be called \"knowledge of the real world\" in carrying their design activities; such knowledge is employed by only a few automated database design tools. Therefore, in recent years, there have been a number of attempts to develop tools that are capable of exploiting such real-world knowledge. It has been claimed that the use of such knowledge has the potential to increase the diagnostic performance of automated database design tools. However, to date, little if any formal exploration and validation of this claim has taken place. This paper presents our activities in exploring and validating the implications for exploiting three approaches facilitating the use and exploitation of real-world knowledge in the diagnostic performance of database design tools. The results obtained have demonstrated that the improvement of certain aspects of diagnostic performance has been achieved. However, the extent to which these aspects have been attained and subsequently statistically validated varies.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-interference analysis for mixed criticality code in avionics systems 航空电子系统混合临界码的抗干扰分析
M. Hill, Thomas W. Lake
Future aircraft system procurements are expected to utilise a new form of modular architecture. However, the architectures being put forward only provide for hardware partitioning, and there is little protection for safety-critical processes from interference by rogue processes. This paper puts forward a mixed static/dynamic analysis approach for assuring software partitioning of processes within a single hardware partition. Such an approach is a necessity in cost effective modular architectures if all processes are not to be classified and developed as safety-critical.
未来的飞机系统采购预计将采用一种新的模块化架构形式。然而,所提出的体系结构只提供硬件分区,并且很少保护安全关键进程免受流氓进程的干扰。本文提出了一种静态/动态混合分析方法,以保证在单个硬件分区内对进程进行软件分区。如果不打算将所有流程归类并开发为安全关键流程,那么在具有成本效益的模块化体系结构中,这种方法是必要的。
{"title":"Non-interference analysis for mixed criticality code in avionics systems","authors":"M. Hill, Thomas W. Lake","doi":"10.1109/ASE.2000.873672","DOIUrl":"https://doi.org/10.1109/ASE.2000.873672","url":null,"abstract":"Future aircraft system procurements are expected to utilise a new form of modular architecture. However, the architectures being put forward only provide for hardware partitioning, and there is little protection for safety-critical processes from interference by rogue processes. This paper puts forward a mixed static/dynamic analysis approach for assuring software partitioning of processes within a single hardware partition. Such an approach is a necessity in cost effective modular architectures if all processes are not to be classified and developed as safety-critical.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formal construction of the Mathematically Analyzed Separation Kernel 数学分析分离核的形式化构造
W. B. Martin, P. D. White, F. S. Taylor, A. Goldberg
Describes the formal specification and development of a separation kernel. The Mathematically Analyzed Separation Kernel (MASK), has been used by Motorola on a smartcard project, and as part of a hardware cryptographic platform called the Advanced INFOSEC (INFOrmation SECurity) Machine (AIM). Both MASK and AIM were jointly developed by Motorola and the National Security Agency (NSA). This paper first describes the separation kernel concept and its importance to information security. Next, it illustrates the Specware formal development methodology that was used in the development of MASK. Experiences and lessons learned from this formal development process are discussed. Finally, the results of the MASK development process are described, project successes are discussed, and related MASK research is highlighted.
描述分离内核的正式规范和开发。数学分析分离内核(MASK)已被摩托罗拉用于智能卡项目,并作为称为高级信息安全机器(AIM)的硬件加密平台的一部分。MASK和AIM都是由摩托罗拉和美国国家安全局(NSA)联合开发的。本文首先阐述了分离核的概念及其对信息安全的重要性。接下来,它说明了在MASK开发中使用的Specware正式开发方法。讨论了从这一正式开发过程中获得的经验和教训。最后,描述了MASK开发过程的结果,讨论了项目成功案例,并重点介绍了相关的MASK研究。
{"title":"Formal construction of the Mathematically Analyzed Separation Kernel","authors":"W. B. Martin, P. D. White, F. S. Taylor, A. Goldberg","doi":"10.1109/ASE.2000.873658","DOIUrl":"https://doi.org/10.1109/ASE.2000.873658","url":null,"abstract":"Describes the formal specification and development of a separation kernel. The Mathematically Analyzed Separation Kernel (MASK), has been used by Motorola on a smartcard project, and as part of a hardware cryptographic platform called the Advanced INFOSEC (INFOrmation SECurity) Machine (AIM). Both MASK and AIM were jointly developed by Motorola and the National Security Agency (NSA). This paper first describes the separation kernel concept and its importance to information security. Next, it illustrates the Specware formal development methodology that was used in the development of MASK. Experiences and lessons learned from this formal development process are discussed. Finally, the results of the MASK development process are described, project successes are discussed, and related MASK research is highlighted.","PeriodicalId":206612,"journal":{"name":"Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117201004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
期刊
Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1