skip to main content
research-article

Improving quality of Ada software with range analysis

Published:06 November 2011Publication History
Skip Abstract Section

Abstract

Software in critical embedded systems used in aerospace, military, and transport applications, that is, systems where quality and reliability are imperative, continues to become more complex. For example, the Boeing 787 aircraft flight control system will have about 6.5 million lines of code, the avionics software for the F-22 Raptor consists of 1.7 million lines of code and avionics software for the F-35 Joint Strike Fighter is expected to have 5.7 million lines of code. The Ada programming language has been a key component in these applications and is a language of choice for critical systems where reliability matters. As these systems are becoming more sophisticated, software development organizations must meet stringent software quality objectives that are mandated by the organization itself or required by customers or by government regulations. For software teams to meet these objectives, and to ideally achieve software with minimal defects, the Ada programming language alone may not provide sufficient reliability margins. Coupling the Ada language with state of the art testing and verification solutions may improve the predictability of risk. This paper examines software verification and testing approaches that have been applied to Ada programs.

References

  1. Mecham, M. 2007. Boeing Faces Pretty Tight 787 Delivery Schedule. Aviation Week. 9 September 2007.Google ScholarGoogle Scholar
  2. Pace, S. 1999. F-22 Raptor: America's Next Lethal War Machine. Mcgraw-Hill.Google ScholarGoogle Scholar
  3. Goebel, G. 2001. The Lockheed Martin F-35 Joint Strike Fighter (JSF). http://www.vectorsite.net/avf35.html.Google ScholarGoogle Scholar
  4. Zemskyy D. Safety and Reliability Considerations in DO-178B.Google ScholarGoogle Scholar
  5. Pan, J. 1999. Dependable Embedded Systems. Software Testing.Google ScholarGoogle Scholar
  6. Reihle R. "Can Software Be Safe?-An Ada Viewpoint". Embedded Systems Programming.Google ScholarGoogle Scholar
  7. Feldman, M. Who is using Ada. http://www.seas.gwu.edu/~mfeldman/ada-project-summary.html.Google ScholarGoogle Scholar
  8. Fagan M. 1976. Design and Code Inspections to Reduce Errors in Program Development. IBM Systems Journal. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cousot, P. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cousot P., Cousot R. 1992. Comparing the Galois Connection and Widening / Narrowing Approaches to Abstract Interpretation. Symposium on Programming Language Implementation and Logic Programming. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Cousot P. 1996. Abstract Interpretation. ACM Computing Surveys. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cousot P., Cousot R., 2001. Abstract Interpretation Based Formal Methods and Future Challenges. Informatics. 10 Years Back. 10 Years Ahead,. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deutsch A. 2003. Static Verification of Dynamic Properties. SIGAda.Google ScholarGoogle Scholar
  14. Regehr, J., Reid, A., Webb, K. 2003. Eliminating stack overflow by abstract interpretation. In Proc. of the 3rd International Conf. on Embedded Software (EMSOFT).Google ScholarGoogle ScholarCross RefCross Ref
  15. DAEDALUS. 2011. http://www.di.ens.fr/~cousot/projects/DAEDALUS.Google ScholarGoogle Scholar
  16. Spoto A. 1982. JULIA: A Generic Static Analyser for the Java Bytecode.Google ScholarGoogle Scholar
  17. Polyspace. 2011. http://www.mathworks.com/products/polyspace.Google ScholarGoogle Scholar

Index Terms

  1. Improving quality of Ada software with range analysis

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!