AADL (architecture analysis and design language) model extension based software system security verification and assessment method

A software system and security technology, applied in platform integrity maintenance, electrical digital data processing, instruments, etc., can solve the problems of direct processing of difficult system models, computational redundancy, huge computational cost, etc., to improve the accuracy of evaluation. Effect

Active Publication Date: 2018-08-07
HARBIN INST OF TECH
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem that the existing AADL model-based verification evaluation is difficult to directly process the system model, which requires a huge calculation cost and contains a lot of redundancy in the calculation, and proposes an AADL model-based extension Software System Security Verification and Evaluation Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AADL (architecture analysis and design language) model extension based software system security verification and assessment method
  • AADL (architecture analysis and design language) model extension based software system security verification and assessment method
  • AADL (architecture analysis and design language) model extension based software system security verification and assessment method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0018] Specific implementation mode one: the software system security verification and evaluation method based on the AADL model extension of this implementation mode, such as figure 1 shown, including:

[0019] Step 1. Determine the risk factor list of the system to be evaluated, and establish a mapping relationship between each risk factor in the risk factor list and the AADL error model attachment according to the preset grammatical rules; then establish a mapping relationship between the AADL error model attachment and the AADL architecture model, In order to establish the relationship between the risk factors and the AADL framework model; and the set of all established relationships is called the mechanism generation model. For example, the list of risk factors determined for a certain flight control software may include abnormal bus voltage, abnormal power supply of a single aircraft, failed self-test of a single aircraft, inaccurate navigation calculation, incorrect tim...

specific Embodiment approach 2

[0025] Specific embodiment two: the difference between this embodiment and specific embodiment one is: the software system security verification and evaluation method based on AADL model expansion also includes step seven (such as image 3 shown):

[0026] The AADL error model attachment in step 1 is mapped and converted to obtain the Markov chain; the probability calculation of the Markov chain is performed to obtain the component hazard probability; the combination of component hazard probabilities is calculated to obtain the system hazard probability; sex assessment results.

[0027] Other steps and parameters are the same as those in Embodiment 1.

specific Embodiment approach 3

[0028] Specific embodiment three: the difference between this embodiment and specific embodiment one or two is that in step one, the mapping relationship between each risk factor in the risk factor list and the AADL error model attachment is established according to the preset grammatical rules:

[0029] Map the key tasks in the main task process to the initial state in the AADL model attachment; map the error handling process in the key person to the error state in the AADL model attachment; map the elements in the risk factor list to error events; map the task's The execution sequence is mapped to the logical relationship and propagation path between components.

[0030] Other steps and parameters are the same as those in Embodiment 1 or Embodiment 2.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an AADL (architecture analysis and design language) model extension based software system security verification and assessment method, which is provided in order to overcome defect of difficulty in direct processing of system models, high computation cost and high redundancy in computation in existing AADL model based verification and assessment. The method includes: establishing relationship between risk factors and an AADL architecture model to form a mechanism generating model; extracting model elements, generating a time state fault tree, a hardware software impactanalysis tree and a common cause time-dependent analysis tree according to the model elements, and backstepping a risk generation route according to the tree structure from bottom to top; setting physical resource properties and capacity of each physical device; calculating the failure probability of each physical device according to labeled risk factor probability of each physical device; converting an AADL security model into a timed automata; calling a formal verification tool UPPAAL for analysis and verification of the timed automata. The method is applicable to security assessment of software and hardware systems.

Description

technical field [0001] The invention relates to the technical field of software system security analysis, in particular to a software system security verification and evaluation method based on AADL model extension. Background technique [0002] In a complex hybrid system of software and hardware, the increasing scale of software and the rapid increase of system complexity have brought important challenges in software security assurance. [0003] AADL is a modeling language for modeling safety-critical systems with resource (size, weight, power) constraints and stringent real-time response requirements. AADL can describe the dynamic behavior of the runtime architecture. These descriptions enable the analysis of components and systems, and the analysis and evaluation of system performance can be completed before system coding. [0004] AADL error attachment is a standard extension of the AADL model. AADL error attachment declares a set of error state (Error State), error eve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57G06F2221/033
Inventor 孙超高昕睿许永辉刘晓东
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products