Method for sufficiently inspecting safety analysis of embedded software
A technology of embedded software and inspection methods, which is applied in the computer field, can solve the problems that it is difficult to evaluate software security analysis work is sufficient and effective, and achieve the effect of improving quality and efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] The object selected in this example is a certain type of radar data processing embedded software security analysis project. The radar data processing software receives the radar echo data, performs signal processing on the radar echo data according to different working methods, and then converts the data into corresponding meteorological video signals or terrain video signals according to different working methods, and outputs them to the avionics system for display The processing unit is configured to output a wind shear warning signal to the warning system in a wind shear state. The entire project uses three analysis techniques to carry out software security analysis, namely PHA analysis, FMEA analysis, and FHA analysis.
[0092] The first step is to clarify the results of PHA, FHA, and FMEA analysis work. See attached table 1 for the results of PHA analysis work, see attached table 2 for the results of FHA analysis work, and see attached table 3 for the results of F...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 