Unlock instant, AI-driven research and patent intelligence for your innovation.

IMA security verification and analysis method based on requirement

An analysis method and safety verification technology, applied in the direction of platform integrity maintenance, etc., can solve the problem of less analysis and verification of IMA system safety, and achieve the effect of improving accuracy

Active Publication Date: 2017-09-29
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with component failure, a large number of potential hazards in IMA are caused by component interaction. At present, there are few researches on the analysis and verification of IMA system security, and this problem has not been well solved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IMA security verification and analysis method based on requirement
  • IMA security verification and analysis method based on requirement
  • IMA security verification and analysis method based on requirement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are explanations of the present invention and the present invention is not limited to the following examples.

[0044] Such as figure 1 Shown, a kind of demand-based IMA security verification analysis method of the present invention comprises the following steps:

[0045] Step 1: Determine system-level hazards and security constraints; analyze system-level hazards, and obtain system-level security constraints of partition communication modules. In order to find the system-level hazards that can lead to partition communication modules, starting from the services provided by the IMA system, find the services related to partition communication provided by IMA, and then find the hazards that will cause the failure of related services, thus determining the system-level of partition communication Danger. If the inter-partition co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IMA security verification and analysis method based on a requirement. The method includes the following steps that 1, system-level hazards and security constraints are determined; 2, a control structure diagram of a system is built, unsafe control behaviors are found out through the control structure diagram, and the safety requirement of the system is then obtained; 3, an SCR model is used for modeling the safety requirement, requirements inaccurately described are modified, and the reliability and accuracy of the requirement are verified through a formalized method. According to the method, the control structure of the system can be effectively analyzed, potential hazards caused by the interaction of assemblies, and the safety requirement of the system is obtained.

Description

technical field [0001] The invention relates to a safety verification analysis method, in particular to a demand-based IMA safety verification analysis method. Background technique [0002] Integrated Modular Avionics (IMA) is a new stage in the development of avionics system architecture. The IMA architecture brings more flexibility to avionics development and significantly improves development efficiency. An important benefit of the IMA architecture is that it allows application systems to be developed independently and then integrated into a unified IMA platform to share hardware resources. The isolation of system development and security assessment, coupled with the different perceptions of system security by different developers, makes the security analysis of IMA very complicated. The traditional hazard analysis method based on the event chain model considers hardware and software together and mainly considers component failure. These traditional hazard analysis metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/53G06F21/57
CPCG06F21/53G06F21/57
Inventor 王立松汪圆圆胡军周颖
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS