Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedded software security analysis method and system based on SysML

An embedded software and analysis method technology, applied in computer security devices, software testing/debugging, platform integrity maintenance, etc., can solve problems such as reducing development efficiency, difficult integration of system and software models, and inability to effectively feedback the system. Achieve the effect of reducing model inconsistency, reducing difficulty of use, and easy learning and mastering

Pending Publication Date: 2022-03-25
CHINA AERO POLYTECH ESTAB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of embedded software security analysis, there are already a series of relatively mature tools for model-based formal verification, including SMV, Spin, UPPAL, CBMC, BLAST and SLAM, etc. These tools use different modeling methods and languages, although The current software verification technology has been partially applied in the industry, but the complexity of the formal method and modeling language itself also puts forward high requirements for engineers, which is very difficult for the popularization and use of the current software verification technology
[0003] At present, when developing weapons and equipment, system developers and embedded software security analysts use different modeling tools and modeling methods. It is difficult to integrate the models of the system and software, which ultimately leads to the development of systems and embedded software security. Analyze the phenomenon of "two skins"
Due to different models, when carrying out security analysis of embedded software, it is impossible to reuse model elements such as system cross-link design, function list, and system hazards that have been completed in the system design process, and can only perform repeated modeling, which greatly reduces the overall development efficiency
In addition, the results of embedded software security analysis cannot be effectively fed back to the system. System designers cannot accurately understand the feedback of design decisions in the software in real time, and cannot obtain the security requirements delivered to the system by the embedded software security analysis in real time. Effectively carry out integrated analysis of software and hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded software security analysis method and system based on SysML
  • Embedded software security analysis method and system based on SysML
  • Embedded software security analysis method and system based on SysML

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0052] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0053] figure 1 Show the embedded software security analysis method based on SysML of the present invention, this method comprises the following steps:

[0054] S1. Extend the semantics of SysML language: To meet the needs of software modeling and security analysis, extend ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a SysML-based embedded software security analysis method, which comprises the following steps of: expanding semantics of a SysML language, creating a software model based on the extended SysML language, completely and accurately describing a static structure and a dynamic behavior of software, and establishing a security analysis rule library to analyze the security of the software. Software function model analysis, functional hierarchy model analysis, software state model analysis, SysML multi-model diagram association analysis and system and software association influence analysis are carried out on a software model, whether the software model meets a security rule or not is verified, and the embedded software security analysis system is provided based on the verification result. According to the method, the problems of system analysis and software analysis are solved, repeated modeling is avoided, the workload of software modeling is reduced, and the method is good in universality, easy to popularize and high in expandability.

Description

technical field [0001] The invention belongs to the technical field of embedded software security analysis, in particular to a SysML-based embedded software security analysis method and an analysis system thereof. Background technique [0002] With the development of intelligence, systematization and networking of modern weapons and equipment, the technical process and management process of equipment development are becoming more and more complex, and the use of system engineering and model-based systems engineering theory to ensure the successful development of complex equipment has become a weapon at home and abroad. A consensus generally reached in the field of equipment development. SysML is a standard modeling language for systems engineering. During the development of weapons and equipment, more and more researchers use SysML to formally model the system and carry out forward design of the system. In the field of embedded software security analysis, there are already ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/57
CPCG06F11/3668G06F21/577
Inventor 周汉清吕海熊唐洋封二强蔡玉华刘勇李鑫然
Owner CHINA AERO POLYTECH ESTAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products