Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An embedded software security automatic verification system and verification method thereof

An automatic verification and embedded software technology, applied in software testing/debugging, instrumentation, error detection/correction, etc., can solve problems such as limited coverage, low popularity, execution uncertainty, etc., to reduce the difficulty of project implementation, The effect of enhancing the guiding role and lowering the threshold of use

Active Publication Date: 2019-01-25
CHINA AERO POLYTECH ESTAB
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited coverage of test cases in the process of software testing, it is difficult to exhaustively test the entire system, and the operation of a safety-critical system is usually related to the external environment, its execution is often uncertain, and testing is extremely difficult. Therefore, software testing methods cannot Fundamentally guarantee the security of the system
[0004] At present, due to its strong theoretical nature, formal verification methods are rarely used in the development of embedded software.
As for software testing, although some testing platforms have appeared, their popularity is relatively low.
Most of them use manual testing. For complex software systems, the testing efficiency is low, and software problems caused by multi-state concurrency and multi-functional conflicts cannot be found.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An embedded software security automatic verification system and verification method thereof
  • An embedded software security automatic verification system and verification method thereof
  • An embedded software security automatic verification system and verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical scheme of the present invention will be described in further detail below in conjunction with accompanying drawing and embodiment:

[0041] See attached figure 1 As shown, the embedded software safety automatic verification system described in the technical solution of the present invention is characterized in that: the system includes:

[0042] A software requirement modeling module 1, its function is to formally describe the software to be verified according to the ICD file and requirement specification of the software to be verified, and form a software requirement model file. The software requirement modeling module 1 includes:

[0043] ICD modeling module 2, its function is to describe the external cross-linking environment of the software to be verified, including the cross-linking relationship with external devices, bus type and communication protocol, and form ICD model data;

[0044] Software formal modeling module 3, its function is to use OCL for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded software security automation verification system and a verification method thereof. According to the technical scheme, double verification of software security is realized in combination with a model checking-based formal verification technology and a model-based software test technology. The automation verification system disclosed by the invention comprises four parts, which are a software demand modeling module, a security verification rule database, a formal verification module, and a security test module respectively. The software demand modeling module comprises two sub-modules, wherein the ICD modeling module describes a software external cross-linking environment, and the formal modeling module describes a software internal behavior. The security verification rule database is constructed and used for storing security verification rules. The formal verification module is constructed and used for performing model verification on a software demand based on the security verification rules and a model detection algorithm. The software detection module comprises two modules, wherein the test case generation module is used for generating an executable security case, and a test case translation module performs format conversion on the generated case.

Description

technical field [0001] The invention relates to an embedded software safety automatic verification system and a verification method thereof, belonging to the field of software safety analysis. Background technique [0002] Embedded software is widely used in aerospace and other fields, and more and more functions are realized by software. In recent years, with the increase of software complexity, failures caused by software failures occur frequently, so ensuring the security of embedded software has become a research hotspot in the field of software engineering in recent years. The mature experience in Europe and the United States shows that carrying out software security analysis is an effective way to improve software quality. The main work includes the extraction and specification of embedded software security requirements, standard-oriented embedded software development, and embedded software security requirements verification. [0003] Embedded software requirements ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3684
Inventor 周汉清黄燕冰江志炜
Owner CHINA AERO POLYTECH ESTAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products