skip to main content
research-article

The AADL Error Library: An Operationalized Taxonomy of System Errors

Published:10 January 2020Publication History
Skip Abstract Section

Abstract

The problem of how to best classify system errors has been a topic of research for years. In this paper, we present an established taxonomy that draws on a broad range of previous work in this area: the Architecture Analysis and Design Language's (AADL) EMV2 Error Library. The error library is now part of an international standard and has been used in a range of systems and domains. In this work, we describe its features, including that: a) it is deeply integrated in a rich, semi-formal system modeling language (AADL); b) the errors it includes have formalized semantics; and c) it is designed to be easily extensible by system developers to become domainor system-specific. We describe the original inspirations and prior work that informed the library's design, document the error families that comprise the taxonomy, and discuss the library's usage in an architecturally-integrated system assurance process.

References

  1. Asim Abdulkhaleq and Stefan Wagner. 2015. XSTAMPP: An eXtensible STAMP platform as tool support for safety engineering. In 2015 STAMP Workshop, MIT, Boston, USA. Universität Stuttgart, Boston, MA. https://doi.org/10.18419/ opus-3533Google ScholarGoogle Scholar
  2. A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1, 1 (jan 2004), 11--33. https://doi.org/10.1109/TDSC.2004.2Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Bondavalli and L. Simoncini. 1990. Failure classification with respect to detection. In [1990] Proceedings. Second IEEE Workshop on Future Trends of Distributed Computing Systems. 47--53. https://doi.org/10.1109/FTDCS.1990.138293Google ScholarGoogle Scholar
  4. Alex Boydston, Peter Feiler, Steve Vestal, and Bruce Lewis. 2015. Joint Common Architecture (JCA) Demonstration Architecture Centric Virtual Integration Process (ACVIP) Shadow Effort. In AHS 71st Annual Forum. Virginia Beach, Virginia, 1--12.Google ScholarGoogle Scholar
  5. Julien Delange and Peter Feiler. 2014. Architecture Fault Modeling with the AADL Error-Model Annex. In 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications. IEEE, Verona, Italy, 361--368. https: //doi.org/10.1109/SEAA.2014.20Google ScholarGoogle Scholar
  6. Danny Dolev and Andrew C. Yao. 1983. On the Security of Public Key Protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198--208.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Clifton A. Ericson II. 2016. Hazard Analysis Techniques for System Safety (second ed.). John Wiley & Sons, Inc., Fredericksburg, Virginia, United States of America. 1--640 pages.Google ScholarGoogle Scholar
  8. Peter Feiler. 2015. Architecture-Led Safety Analysis of the Joint Multi-Role (JMR) Joint Common Architecture (JCA) Demonstration System. Technical Report. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  9. Peter Feiler and David Gluch. 2012. Model-Based Engineering with AADL (1st ed.). Addison-Wesley Professional, Upper Saddle River, NJ. i--468 pages.Google ScholarGoogle Scholar
  10. Peter Feiler, Jorgen Hansson, Dionisio de Niz, and Lutz Wrage. 2009. System Architecture Virtual Integration: An Industrial Case Study. Technical Report. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. 1--48 pages.Google ScholarGoogle Scholar
  11. J A Goguen and J Meseguer. 1982. Security Policies and Security Models. In Proceedings IEEE Symposium on Security and Privacy. IEEE, Oakland, California, USA, 11--20. https://doi.org/10.1109/SP.1982.10014Google ScholarGoogle ScholarCross RefCross Ref
  12. Jonathan Herzog. 2005. A computational interpretation of Dolev--Yao adversaries. Theoretical Computer Science 340, 1 (Jun 2005), 57--81. https://doi.org/10.1016/J. TCS.2005.03.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jérôme Hugues and Julien Delange. 2017. Model-Based Design and Automated Validation of ARINC653 Architectures Using the AADL. In Cyber-Physical System Design from an Architecture Analysis Viewpoint. Springer Singapore, Chapter 2, 33--52. https://doi.org/10.1007/978--981--10--4436--6_2Google ScholarGoogle Scholar
  14. ISO/IEC JTC 1/SC 7 Software and Systems Engineering Technical Committee. 2010. Systems and software engineering -- Vocabulary. Technical Report. ISO/IEC/IEEE.Google ScholarGoogle Scholar
  15. J. C. Laprie. 1992. Dependability: Basic Concepts and Terminology. Springer Vienna, Vienna, 3--245. https://doi.org/10.1007/978--3--7091--9170--5_1Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Brian Larson, John Hatcliff, Kim Fowler, and Julien Delange. 2013. Illustrating the AADL Error Modeling Annex (v.2) Using a Simple Safety-Critical Medical Device. ACM SIGAda Ada Letters 33, 3 (nov 2013), 65--84. https://doi.org/10. 1145/2658982.2527271Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nancy (Massachusetts Institute of Technology) Leveson. 2012. Engineering a Safer World. MIT Press.Google ScholarGoogle Scholar
  18. J. A. McDermid and D. J. Pumfrey. 1994. A development of hazard analysis to aid software design. In Computer Assurance, Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security (COMPASS). 17--25. https://doi.org/10.1109/ CMPASS.1994.318470Google ScholarGoogle Scholar
  19. David Powell. 1995. Failure Mode Assumptions and Assumption Coverage. Springer Berlin Heidelberg, Berlin, Heidelberg, 123--140. https://doi.org/10. 1007/978--3--642--79789--7_8Google ScholarGoogle Scholar
  20. Sam Procter. 2016. A development and assurance process for Medical Application Platform apps. Ph.D. Dissertation. Kansas State University.Google ScholarGoogle Scholar
  21. Sam Procter, Eugene Y. Vasserman, and John Hatcliff. 2017. SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis (ARES '17). ACM, New York, NY, USA, Article 66, 10 pages. https://doi.org/10.1145/3098954.3105823Google ScholarGoogle Scholar
  22. Felix Redmill, Morris Chudleigh, and James Catmur. 1999. System Safety: HAZOP and Software HAZOP (1 ed.). John Wiley & Sons, Ltd, Chichester, West Sussex, England. 1--248 pages.Google ScholarGoogle ScholarCross RefCross Ref
  23. SAE AS-2C Architecture Analysis and Design Language Committee. 2017. AS5506C: Architecture Analysis and Design Language (AADL). Technical Report. SAE Aerospace.Google ScholarGoogle Scholar
  24. SAE AS-2C Architecture Description Language Subcommittee. 2015. SAE Architecture Analysis and Design Language (AADL) Annex Volume 1: Annex E: Error Model Annex (Proposed Draft, Rev. A). Technical Report. SAE Aerospace.Google ScholarGoogle Scholar
  25. Danielle Stewart, Michael W. Whalen, Darren Cofer, and Mats P.E. Heimdahl. [n. d.]. Architectural Modeling and Analysis for Safety Engineering. In IMBSA 2017, Marco Bozzano and Yiannis Papadopolous (Eds.). Vol. 10437. Springer International AG, Trento, Italy, 97--111. https://doi.org/10.1007/978--3--319--64119--5_7Google ScholarGoogle Scholar
  26. John Thomas. 2013. Extending and Automating a Systems-Theoretic Hazard Analysis for Requirements Generation and Analysis. Ph.D. Dissertation. Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  27. Malcolm Wallace. [n. d.]. Modular Architectural Representation and Analysis of Fault Propagation and Transformation. In FESCA 2005, Vol. 141. 53--71. https: //doi.org/10.1016/j.entcs.2005.02.051Google ScholarGoogle Scholar
  28. C.J. Walter and N. Suri. 2003. The customizable fault/error model for dependable distributed systems. Theoretical Computer Science 290, 2 (2003), 1223 -- 1251. https://doi.org/10.1016/S0304--3975(01)00203--1 Dependable Computing.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGAda Ada Letters
    ACM SIGAda Ada Letters  Volume 39, Issue 1
    June 2019
    101 pages
    ISSN:1094-3641
    DOI:10.1145/3379106
    • Editor:
    • Alok Srivastava
    Issue’s Table of Contents

    Copyright © 2020 Copyright is held by the owner/author(s)

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 January 2020

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!