TY - CHAP
T1 - Safecharts model checking for the verification of safety-critical systems
AU - Hsiung, Pao Ann
AU - Lin, Yen Hung
AU - Chen, Yean Ru
PY - 2006
Y1 - 2006
N2 - Unintentional design faults in safety-critical systems might result in injury or even death to human beings. However, the safety verification of such systems is getting very difficult because designs are becoming very complex. To cope with high design complexity, model-driven architecture (MDA) design is becoming a well-accepted trend. However, conventional methods of code testing and hazard analysis do not fit very well with MDA. To bridge this gap, we propose a safecharts model-based formal verification technique for safety-critical systems. The safety constraints in safecharts are mapped to semantic equivalents in timed automata. The theory for safety verification is proved and implemented in the SGM model checker. Prioritized and urgent transitions are implemented in SGM to model the safechart risk semantics. Finally, it is shown that priority-based approach to mutual exclusion of resource usage in safecharts is unsafe and solutions are proposed. Application examples show the benefits of the proposed model-driven verification method.
AB - Unintentional design faults in safety-critical systems might result in injury or even death to human beings. However, the safety verification of such systems is getting very difficult because designs are becoming very complex. To cope with high design complexity, model-driven architecture (MDA) design is becoming a well-accepted trend. However, conventional methods of code testing and hazard analysis do not fit very well with MDA. To bridge this gap, we propose a safecharts model-based formal verification technique for safety-critical systems. The safety constraints in safecharts are mapped to semantic equivalents in timed automata. The theory for safety verification is proved and implemented in the SGM model checker. Prioritized and urgent transitions are implemented in SGM to model the safechart risk semantics. Finally, it is shown that priority-based approach to mutual exclusion of resource usage in safecharts is unsafe and solutions are proposed. Application examples show the benefits of the proposed model-driven verification method.
UR - http://www.scopus.com/inward/record.url?scp=84899350916&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84899350916&partnerID=8YFLogxK
U2 - 10.4018/978-1-59140-851-2.ch014
DO - 10.4018/978-1-59140-851-2.ch014
M3 - Chapter
AN - SCOPUS:84899350916
SN - 9781591408512
SP - 378
EP - 412
BT - Verification, Validation and Testing in Software Engineering
PB - IGI Global
ER -