Software approach to hazard detection using on-line analysis of safety constraints

Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper addresses the problem of hazard detection through the development of an online analysis tool. The approach allows the user to specify complex multi-source hazards using a query-like language, uses both synchronous and asynchronous online checking approaches to balance efficiency and expressiveness, accommodates dynamic applications through dynamic constraint addition, and supports distributed and parallel applications running in heterogeneous environments.

[1]  Simin Nadjm-Tehrani,et al.  Proving dynamic properties in an aerospace application , 1995, Proceedings 16th IEEE Real-Time Systems Symposium.

[2]  Weiming Gu On-line monitoring and interactive steering of large-scale parallel and distributed applications , 1996 .

[3]  Jan Chomicki,et al.  Efficient checking of temporal integrity constraints using bounded history encoding , 1995, TODS.

[4]  John C. Knight,et al.  A Safety Kernel Architecture , 1994 .

[5]  Karsten Schwan,et al.  From interactive applications to distributed laboratories , 1998, IEEE Concurr..

[6]  Arie Segev,et al.  A glossary of temporal database concepts , 1992, SGMD.

[7]  Peter Neumann,et al.  Safeware: System Safety and Computers , 1995, SOEN.

[8]  Greg Eisenhauer Portable Self-Describing Binary Data Streams , 1994 .

[9]  Karsten Schwan,et al.  Falcon: on-line monitoring and steering of large-scale parallel programs , 1995, Proceedings Frontiers '95. The Fifth Symposium on the Frontiers of Massively Parallel Computation.

[10]  Nancy G. Leveson,et al.  Software safety , 1982, ACM SIGSOFT Softw. Eng. Notes.

[11]  G LevesonNancy Software safety in embedded computer systems , 1991 .

[12]  Louise E. Moser,et al.  Formal verification of safety‐critical systems , 1990, Softw. Pract. Exp..

[13]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[14]  T. Anderson,et al.  Eecient Software-based Fault Isolation , 1993 .

[15]  Nancy G. Leveson,et al.  Safety analysis tools for requirements specifications , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.

[16]  Karsten Schwan,et al.  Application-Dependent Dynamic Monitoring of Distributed and Parallel Systems , 1993, IEEE Trans. Parallel Distributed Syst..

[17]  Paulo Veríssimo,et al.  Real time and dependability concepts , 1993 .

[18]  Karsten Schwan,et al.  DataExchange: High Performance Communications in Distributed Laboratories , 1998, Parallel Comput..

[19]  Richard Gerber,et al.  Guaranteeing end-to-end timing constraints by calibrating intermediate processes , 1994, 1994 Proceedings Real-Time Systems Symposium.

[20]  Algirdas Avizienis,et al.  The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.

[21]  Nancy G. Leveson,et al.  Software Deviation Analysis , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[22]  Nancy G. Leveson,et al.  Completeness and Consistency in Hierarchical State-Based Requirements , 1996, IEEE Trans. Software Eng..

[23]  Oscar Naim,et al.  MDL: a language and compiler for dynamic program instrumentation , 1997, Proceedings 1997 International Conference on Parallel Architectures and Compilation Techniques.

[24]  Karsten Schwan,et al.  Using languages for capture, analysis and display of performance information for parallel and distributed applications , 1990, Proceedings. 1990 International Conference on Computer Languages.

[25]  Tucker R. Balch,et al.  Avoiding the past: a simple but effective strategy for reactive navigation , 1993, [1993] Proceedings IEEE International Conference on Robotics and Automation.

[26]  Nancy G Leveson,et al.  Software safety: why, what, and how , 1986, CSUR.

[27]  Aaron G. Cass,et al.  Testing a safety-critical application , 1994, ISSTA '94.

[28]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[29]  Kyo Chul Kang,et al.  Safety-Critical Software: Status Report and Annotated Bibliography , 1993 .

[30]  Constance L. Heitmeyer,et al.  MT: A toolset for specifying and analyzing real-time systems , 1993, 1993 Proceedings Real-Time Systems Symposium.

[31]  Yiannis E. Papelis,et al.  The Iowa Driving Simulator: An Immersive Research Environment , 1995, Computer.

[32]  Greg Eisenhauer,et al.  The DataExchange Library , 1996 .

[33]  Pravin Varaiya,et al.  Driving safely in smart cars , 1995, Proceedings of 1995 American Control Conference - ACC'95.

[34]  John A. Reed,et al.  Development of an intelligent monitoring and control system for a heterogeneous numerical propulsion system simulation , 1995, Proceedings of Simulation Symposium.

[35]  Patrick E. O'Neil,et al.  Database Principles, Programming, Performance , 1994 .

[36]  Richard T. Snodgrass,et al.  Monitoring distributed systems: a relational approach , 1982 .

[37]  Karsten Schwan,et al.  A Language and System for the Construction and Tuning of Parallel Programs , 1988, IEEE Trans. Software Eng..

[38]  Robyn R. Lutz Targeting safety-related errors during software requirements analysis , 1996, J. Syst. Softw..

[39]  Allen D. Malony,et al.  Performance Measurement Intrusion and Perturbation Analysis , 1992, IEEE Trans. Parallel Distributed Syst..

[40]  Guangtian Liu,et al.  Efficient Run-time Monitoring Of Timing Constraints , 1997, Proceedings Third IEEE Real-Time Technology and Applications Symposium.

[41]  Thomas Stauner,et al.  Using HYTECH to Verify an Automative Control System , 1997, HART.

[42]  A. Schaplowsky Handbook of System and Product Safety , 1974 .

[43]  Christian S. Jensen,et al.  Adding Valid Time to SQL/Temporal , 1996 .

[44]  Leslie Lamport,et al.  Synchronizing Time Servers , 1987 .

[45]  Guangtian Liu,et al.  Early detection of timing constraint violation at runtime , 1997, Proceedings Real-Time Systems Symposium.

[46]  Farnam Jahanian,et al.  An approach to monitoring and assertion-checking of real-time specifications , 1996, Proceedings of the 4th International Workshop on Parallel and Distributed Real-Time Systems.

[47]  John K. Ousterhout,et al.  Tcl and the Tk Toolkit , 1994 .

[48]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[49]  Richard T. Snodgrass,et al.  The temporal query language TQuel , 1987, TODS.

[50]  Tucker R. Balch,et al.  Communication in reactive multiagent robotic systems , 1995, Auton. Robots.

[51]  Yennun Huang,et al.  Software Implemented Fault Tolerance Technologies and Experience , 1993, FTCS.

[52]  Jack C. Wileden,et al.  High-level debugging of distributed systems: The behavioral abstraction approach , 1983, J. Syst. Softw..

[53]  Nancy G. Leveson,et al.  Safeware: System Safety and Computers , 1995 .

[54]  Ingemar J. Cox,et al.  Exception handling in robotics , 1989, Computer.

[55]  Richard T. Snodgrass,et al.  A relational approach to monitoring complex systems , 1988, TOCS.

[56]  Richard T. Snodgrass,et al.  The TSQL2 Temporal Query Language , 1995 .

[57]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[58]  John McLean,et al.  High Assurance Computer Systems: A Research Agenda , 1995 .

[59]  Willie Hammer Handbook of system and product safety , 1972 .

[60]  Calton Pu,et al.  Differential evaluation of continual queries , 1996, Proceedings of 16th International Conference on Distributed Computing Systems.