skip to main content
research-article

Using SPARK to Ensure System to Software Integrity: A Case Study

Published:20 October 2020Publication History
Skip Abstract Section

Abstract

This paper describes work in progress on a workflow that supports consistent property-preservation proofs from early stages of system requirements specifications down to software requirements and final implementation. This workflow, called System-to-Software Integrity (SSI), demonstrates that the implemented software satisfies constraints defined in system requirements.

References

  1. J. Abrial, "Data semantics," in <i>Data Base Management, Proceeding of the IFIP Working Conference Data Base Management, Cargèse, Corsica, France, April 1-5, 1974.</i>, pp. 1-60, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Lamport, "The temporal logic of actions," <i>ACM Trans. Program. Lang. Syst.</i>, vol. 16, pp. 872-923, May 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Jackson, "Alloy: A lightweight object modelling notation," <i>ACM Trans. Softw. Eng. Methodol.</i>, vol. 11, pp. 256-290, Apr. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Meyer, <i>Object-oriented software construction</i>, vol. 2. Prentice hall New York, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Carre, "Program analysis and verification," in <i>High-integrity software</i>, pp. 176-197, Springer, 1989.Google ScholarGoogle Scholar
  6. M. Delahaye, N. Kosmatov, and J. Signoles, "Common specification language for static and dynamic analysis of C programs," in <i>Proceedings of the 28th Annual ACM Symposium on Applied Computing</i>, pp. 1230- 1235, ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. W. Fifarek, L. G. Wagner, J. A. Hoffman, B. D. Rodes, M. A. Aiello, and J. A. Davis, "Spear v2.0: Formalized past ltl specification and analysis of requirements," in <i>NASA Formal Methods Symposium</i>, pp. 420- 426, Springer, 2017.Google ScholarGoogle Scholar
  8. E. T. McGee and J. D. McGregor, "Composition of proof-carrying architectures for cyber-physical systems," in Proceedings of the 19th International Conference on Software Product Line, SPLC '15, (New York, NY, USA), pp. 419-426, ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Balasubramanian, G. Pap, H. Nine, G. Karsai, M. Lowry, C. Păsăreanu, and T. Pressburger, "Rapid property specification and checking for model-based formalisms," in <i>2011 22nd IEEE International Symposium on Rapid System Prototyping</i>, pp. 121-127, IEEE, 2011.Google ScholarGoogle Scholar
  10. J.-R. Abrial, "The B-book," 1996.Google ScholarGoogle Scholar
  11. J. Hugues and C. Garion, "Leveraging Ada 2012 and spark 2014 for assessing generated code from aadl models," in <i>High Integrity Language Technology, HILT 2014</i>, (Portland, US), pp. 39-46, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Bordin, C. Comar, E. Falis, F. Gasperoni, Y. Moy, E. Richa, and J. Hugues, "System to software integrity: A case study," in <i>Embedded Real-Time Software and Systems 2014</i>, (FR), 2014.Google ScholarGoogle Scholar
  13. R. Kirner, "Towards preserving model coverage and structural code coverage," <i>EURASIP Journal on Embedded Systems</i>, vol. 2009, no. 1, p. 127945, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. I. Dragomir, I. Ober, and C. Percebois, "Contract-based modeling and verification of timed safety requirements within SysML," Software & Systems Modeling, vol. 16, pp. 587-624, May 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Broy, K. Havelund, and R. Kumar, "Towards a unified view of modeling and programming," in International Symposium on Leveraging Applications of Formal Methods, pp. 238-257, Springer, 2016.Google ScholarGoogle Scholar
  16. V. Bonfiglio, L. Montecchi, F. Rossi, P. Lollini, A. Pataricza, and A. Bondavalli, "Executable models to support automated software fmea," in <i>2015 IEEE 16th International Symposium on High Assurance Systems Engineering</i>, pp. 189-196, IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Dieumegard, P.-L. Garoche, T. Kahsai, A. Taillar, and X. Thirioux, "Compilation of synchronous observers as code contracts," in <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>, SAC '15, (New York, NY, USA), pp. 1933-1939, ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. "Engine timing model with closed loop control." https://se.mathworks.com/help/simulink/slref/engine-timing-model-with-closed-loop-control.html, accessed 2019-04-30.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. Using SPARK to Ensure System to Software Integrity: A Case Study

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Article Metrics

          • Downloads (Last 12 months)5
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!