Assessing traditional verification's effectiveness on safety-critical software systems

Lon D. Gowen, James Collofello

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Because of the rapid growth of computer-related technologies, various organizations are putting higher demands on software systems. These include placing software in total or partial control over critical system functions such as navigating planes, controlling traffic systems, identifying military targets, and facilitating medical treatments, to name just a few. Unfortunately, certain faults in such systems can result in catastrophic consequences such as death, injury, or environmental harm. To detect these faults, various standards state that these software systems must undergo verification by specific verification techniques, both static and dynamic. However, some of these techniques are traditional in nature and do not focus on detecting safety-critical faults. Instead, these traditional techniques focus on all classes of faults. To determine the effectiveness of such techniques at detecting safety-critical faults, we conducted an experiment that measured hazardous-fault leakage (i.e., the number of safety-critical faults that these traditional techniques failed to detect). This article discusses this experiment, presents the results, and proposes some new ideas that show promise at reducing hazardous-fault leakage. Additionally, this article discusses traditional verification and how it is inadequate for verifying safety-critical software systems.

Original languageEnglish (US)
Pages (from-to)103-115
Number of pages13
JournalThe Journal of Systems and Software
Volume26
Issue number2
DOIs
StatePublished - 1994

Fingerprint

Computer systems
Experiments

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software

Cite this

Assessing traditional verification's effectiveness on safety-critical software systems. / Gowen, Lon D.; Collofello, James.

In: The Journal of Systems and Software, Vol. 26, No. 2, 1994, p. 103-115.

Research output: Contribution to journalArticle

@article{fae98f509ceb44f38b538a28045b80fc,
title = "Assessing traditional verification's effectiveness on safety-critical software systems",
abstract = "Because of the rapid growth of computer-related technologies, various organizations are putting higher demands on software systems. These include placing software in total or partial control over critical system functions such as navigating planes, controlling traffic systems, identifying military targets, and facilitating medical treatments, to name just a few. Unfortunately, certain faults in such systems can result in catastrophic consequences such as death, injury, or environmental harm. To detect these faults, various standards state that these software systems must undergo verification by specific verification techniques, both static and dynamic. However, some of these techniques are traditional in nature and do not focus on detecting safety-critical faults. Instead, these traditional techniques focus on all classes of faults. To determine the effectiveness of such techniques at detecting safety-critical faults, we conducted an experiment that measured hazardous-fault leakage (i.e., the number of safety-critical faults that these traditional techniques failed to detect). This article discusses this experiment, presents the results, and proposes some new ideas that show promise at reducing hazardous-fault leakage. Additionally, this article discusses traditional verification and how it is inadequate for verifying safety-critical software systems.",
author = "Gowen, {Lon D.} and James Collofello",
year = "1994",
doi = "10.1016/0164-1212(94)90082-5",
language = "English (US)",
volume = "26",
pages = "103--115",
journal = "Journal of Systems and Software",
issn = "0164-1212",
publisher = "Elsevier Inc.",
number = "2",

}

TY - JOUR

T1 - Assessing traditional verification's effectiveness on safety-critical software systems

AU - Gowen, Lon D.

AU - Collofello, James

PY - 1994

Y1 - 1994

N2 - Because of the rapid growth of computer-related technologies, various organizations are putting higher demands on software systems. These include placing software in total or partial control over critical system functions such as navigating planes, controlling traffic systems, identifying military targets, and facilitating medical treatments, to name just a few. Unfortunately, certain faults in such systems can result in catastrophic consequences such as death, injury, or environmental harm. To detect these faults, various standards state that these software systems must undergo verification by specific verification techniques, both static and dynamic. However, some of these techniques are traditional in nature and do not focus on detecting safety-critical faults. Instead, these traditional techniques focus on all classes of faults. To determine the effectiveness of such techniques at detecting safety-critical faults, we conducted an experiment that measured hazardous-fault leakage (i.e., the number of safety-critical faults that these traditional techniques failed to detect). This article discusses this experiment, presents the results, and proposes some new ideas that show promise at reducing hazardous-fault leakage. Additionally, this article discusses traditional verification and how it is inadequate for verifying safety-critical software systems.

AB - Because of the rapid growth of computer-related technologies, various organizations are putting higher demands on software systems. These include placing software in total or partial control over critical system functions such as navigating planes, controlling traffic systems, identifying military targets, and facilitating medical treatments, to name just a few. Unfortunately, certain faults in such systems can result in catastrophic consequences such as death, injury, or environmental harm. To detect these faults, various standards state that these software systems must undergo verification by specific verification techniques, both static and dynamic. However, some of these techniques are traditional in nature and do not focus on detecting safety-critical faults. Instead, these traditional techniques focus on all classes of faults. To determine the effectiveness of such techniques at detecting safety-critical faults, we conducted an experiment that measured hazardous-fault leakage (i.e., the number of safety-critical faults that these traditional techniques failed to detect). This article discusses this experiment, presents the results, and proposes some new ideas that show promise at reducing hazardous-fault leakage. Additionally, this article discusses traditional verification and how it is inadequate for verifying safety-critical software systems.

UR - http://www.scopus.com/inward/record.url?scp=0028484101&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0028484101&partnerID=8YFLogxK

U2 - 10.1016/0164-1212(94)90082-5

DO - 10.1016/0164-1212(94)90082-5

M3 - Article

AN - SCOPUS:0028484101

VL - 26

SP - 103

EP - 115

JO - Journal of Systems and Software

JF - Journal of Systems and Software

SN - 0164-1212

IS - 2

ER -