Safety analysis of heterogeneous-multiprocessor control system software
Gill, Janet A.
Shimeall, Timothy J.
Hefner, Kim A. S.
MetadataShow full item record
Fault trees and Petri nets are two widely accepted graphical tools used in the safety analysis of software. Because some software is life and property critical, thorough analysis techniques are essential. Independently Petri nets and fault trees serve limited evaluation purposes. This thesis presents a technique that converts and links Petri nets to fault trees and fault trees to Petri nets. It enjoys the combinational benefits of both analysis tools. Software Fault Tree Analysis and timed Petri nets facilitate software safety analysis in heterogeneous multiprocessor control systems. Analysis use a Petri net to graphically organize the selected software. A fault tree supports a hazardous condition with subsequent leaf node paths that lead to the hazard. Through the combination of Petri nets and fault trees, an analyst can determine a software fault if he can reach an undesired Petri net state, comparable with the fault tree root fault, from an initial marking. All transitions leading to the undesired state from the initial marking must be enabled and the states must be marked that represent the leaf nodes of the fault tree path. It is not the intention of this thesis to suggest that an analyst be replaced by an automated tool. There must be analyst interaction focusing the analyst's insight and experience on the hazards of a system. This method is proposed only as a tool for evaluation during the overall safety analysis.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Hall, Daniel M. (Monterey, California: Naval Postgraduate School, 2016-06);We evaluate Anseri, a commercial text analytics software, and its ability to assist a military intelligence analyst in the planning phase of major operations. The intelligence cycle involves extensive, timely, and detailed ...
Nguyen, Thuy; Gondree, Mark; Khosalim, J.; Shifflett D.; Levin, T.; Irvine, C. (International Conference on Information Warfare and Security (ICIW 2012), 2012-03-12);Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security ...
Nguyen, Thuy; Gondree, Mark; Khosalim, Jean; Shifflett, David; Levin, Timothy; Irvine, Cynthia (2012-03);Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security ...