Toward Detection of Abnormal Behaviors in Timing and Security Requirements

Finding software system defects during the requirements analysis phase can yield significant savings of time and effort when compared to finding the same defects during development or testing phases. The requirements engineering field has helped bring about significant advances in the early detection of system defects. However, a relatively small amount of research has been done regarding the detection of abnormal system behaviors. This is especially true for non-functional requirements (NFRs), which include areas such as timing and security requirements. Our work proposes the beginnings of a domain-specific modeling language for requirements analysis, with a particular emphasis on detecting abnormal system behaviors. We also demonstrate a preliminary version of our approach on a real-time embedded system.

[1]  Paul Pettersson,et al.  Verifying MARTE/CCSL Mode Behaviors Using UPPAAL , 2013, SEFM.

[2]  Insup Lee,et al.  Generic Infusion Pump Hazard Analysis and Safety Requirements Version 1.0 , 2009 .

[3]  Holger Giese,et al.  Real-Time Statechart Semantics , 2003 .

[4]  Michael D. Harrison,et al.  Demonstrating that Medical Devices Satisfy User Related Safety Requirements , 2014, FHIES/SEHC.

[5]  John C. Knight Software Challenges in Aviation Systems , 2002, SAFECOMP.

[6]  Michael D. Harrison,et al.  Developing and Verifying User Interface Requirements for Infusion Pumps: A Refinement Approach , 2014, FM 2014.

[7]  Xavier Franch,et al.  Non-functional Requirements in Architectural Decision Making , 2013, IEEE Software.

[8]  Po-Hsun Cheng,et al.  Knowledge transfer of software tool development for functional requirements analysis , 2016, Comput. Appl. Eng. Educ..

[9]  Hyunsook Do,et al.  Exposing the susceptibility of off-nominal behaviors in reactive system requirements , 2015, 2015 IEEE 23rd International Requirements Engineering Conference (RE).

[10]  Lu Feng,et al.  Platform-specific timing verification framework in model-based implementation , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[11]  Danielle Gaither,et al.  Verification of Non-functional Requirements Using Formal Semantics , 2017, MoDELS.

[12]  Travis D. Breaux,et al.  Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition , 2016, ACM Trans. Softw. Eng. Methodol..

[13]  Wang Yi,et al.  Formal Verification of UML Statecharts with Real-Time Extensions , 2002, FASE.

[14]  Barry Boehm,et al.  Top 10 list [software development] , 2001 .

[15]  Barry W. Boehm,et al.  Software Defect Reduction Top 10 List , 2001, Computer.

[16]  Nancy G. Leveson,et al.  Role of Software in Spacecraft Accidents , 2004 .

[17]  Antonio Cicchetti,et al.  UML-Based Modeling of Non-Functional Requirements in Telecommunication Systems , 2011, ICSEA 2011.

[18]  Didar Zowghi,et al.  Utilizing TOPSIS: A Multi Criteria Decision Analysis Technique for Non-Functional Requirements Conflicts , 2014, APRES.

[19]  Carlo Ghezzi,et al.  On requirement verification for evolving Statecharts specifications , 2013, Requirements Engineering.

[20]  Lui Sha,et al.  Transforming Medical Best Practice Guidelines to Executable and Verifiable Statechart Models , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[21]  Carlo Ghezzi,et al.  A formal approach to adaptive software: continuous assurance of non-functional requirements , 2011, Formal Aspects of Computing.

[22]  Avishai Wool,et al.  A Statechart-Based Anomaly Detection Model for Multi-Threaded SCADA Systems , 2015, CRITIS.

[23]  David Harel,et al.  Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..