Abstract
This paper describes work in progress on a workflow that supports consistent property-preservation proofs from early stages of system requirements specifications down to software requirements and final implementation. This workflow, called System-to-Software Integrity (SSI), demonstrates that the implemented software satisfies constraints defined in system requirements.
- J. Abrial, "Data semantics," in <i>Data Base Management, Proceeding of the IFIP Working Conference Data Base Management, Cargèse, Corsica, France, April 1-5, 1974.</i>, pp. 1-60, 1974. Google Scholar
Digital Library
- L. Lamport, "The temporal logic of actions," <i>ACM Trans. Program. Lang. Syst.</i>, vol. 16, pp. 872-923, May 1994. Google Scholar
Digital Library
- D. Jackson, "Alloy: A lightweight object modelling notation," <i>ACM Trans. Softw. Eng. Methodol.</i>, vol. 11, pp. 256-290, Apr. 2002. Google Scholar
Digital Library
- B. Meyer, <i>Object-oriented software construction</i>, vol. 2. Prentice hall New York, 1988. Google Scholar
Digital Library
- B. Carre, "Program analysis and verification," in <i>High-integrity software</i>, pp. 176-197, Springer, 1989.Google Scholar
- M. Delahaye, N. Kosmatov, and J. Signoles, "Common specification language for static and dynamic analysis of C programs," in <i>Proceedings of the 28th Annual ACM Symposium on Applied Computing</i>, pp. 1230- 1235, ACM, 2013. Google Scholar
Digital Library
- A. W. Fifarek, L. G. Wagner, J. A. Hoffman, B. D. Rodes, M. A. Aiello, and J. A. Davis, "Spear v2.0: Formalized past ltl specification and analysis of requirements," in <i>NASA Formal Methods Symposium</i>, pp. 420- 426, Springer, 2017.Google Scholar
- E. T. McGee and J. D. McGregor, "Composition of proof-carrying architectures for cyber-physical systems," in Proceedings of the 19th International Conference on Software Product Line, SPLC '15, (New York, NY, USA), pp. 419-426, ACM, 2015. Google Scholar
Digital Library
- D. Balasubramanian, G. Pap, H. Nine, G. Karsai, M. Lowry, C. Păsăreanu, and T. Pressburger, "Rapid property specification and checking for model-based formalisms," in <i>2011 22nd IEEE International Symposium on Rapid System Prototyping</i>, pp. 121-127, IEEE, 2011.Google Scholar
- J.-R. Abrial, "The B-book," 1996.Google Scholar
- J. Hugues and C. Garion, "Leveraging Ada 2012 and spark 2014 for assessing generated code from aadl models," in <i>High Integrity Language Technology, HILT 2014</i>, (Portland, US), pp. 39-46, 2014. Google Scholar
Digital Library
- M. Bordin, C. Comar, E. Falis, F. Gasperoni, Y. Moy, E. Richa, and J. Hugues, "System to software integrity: A case study," in <i>Embedded Real-Time Software and Systems 2014</i>, (FR), 2014.Google Scholar
- R. Kirner, "Towards preserving model coverage and structural code coverage," <i>EURASIP Journal on Embedded Systems</i>, vol. 2009, no. 1, p. 127945, 2009. Google Scholar
Digital Library
- I. Dragomir, I. Ober, and C. Percebois, "Contract-based modeling and verification of timed safety requirements within SysML," Software & Systems Modeling, vol. 16, pp. 587-624, May 2017. Google Scholar
Digital Library
- M. Broy, K. Havelund, and R. Kumar, "Towards a unified view of modeling and programming," in International Symposium on Leveraging Applications of Formal Methods, pp. 238-257, Springer, 2016.Google Scholar
- V. Bonfiglio, L. Montecchi, F. Rossi, P. Lollini, A. Pataricza, and A. Bondavalli, "Executable models to support automated software fmea," in <i>2015 IEEE 16th International Symposium on High Assurance Systems Engineering</i>, pp. 189-196, IEEE, 2015. Google Scholar
Digital Library
- A. Dieumegard, P.-L. Garoche, T. Kahsai, A. Taillar, and X. Thirioux, "Compilation of synchronous observers as code contracts," in <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>, SAC '15, (New York, NY, USA), pp. 1933-1939, ACM, 2015. Google Scholar
Digital Library
- "Engine timing model with closed loop control." https://se.mathworks.com/help/simulink/slref/engine-timing-model-with-closed-loop-control.html, accessed 2019-04-30.Google Scholar
Index Terms
(auto-classified)Using SPARK to Ensure System to Software Integrity: A Case Study
Recommendations
Software Systems Requirements
This module describes course SWE 2623 on software systems requirements given at the School of Computing and Software Engineering Southern Polytechnic State University. The process of extracting, deriving, and validating software requirements from a ...
Software vulnerabilities precluded by spark
SIGAda '11: Proceedings of the 2011 ACM annual international conference on Special interest group on the ada programming languageSoftware vulnerabilities are defined as a property of a system's security requirements, design, implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure [1]. Many organizations ...
Software vulnerabilities precluded by spark
Software vulnerabilities are defined as a property of a system's security requirements, design, implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure [1]. Many organizations ...






Comments