Security-critical software verification method and device, equipment and medium

A software verification and software design technology, applied in software testing/debugging, instrumentation, demand analysis, etc., can solve the problems of large human interference factors, high cost of work, and high requirements for verification personnel, so as to facilitate error analysis and positioning, and improve reliability. Sexuality, the effect of avoiding the interference of human factors

Pending Publication Date: 2022-04-22
中航机载系统共性技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the defects in the prior art, the present invention provides a safety-critical software verification method to solve the problems of the prior art verification that it takes a lot of work to build a model, has high requirements for verification personnel, and has large human interference factors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security-critical software verification method and device, equipment and medium
  • Security-critical software verification method and device, equipment and medium
  • Security-critical software verification method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, so they are only examples, and should not be used to limit the protection scope of the present invention.

[0058] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0059] For the convenience of understanding, the nouns involved in the embodiments of the present invention are explained below:

[0060] FTA (Fault Tree Analysis) is a top-down deductive failure analysis method, which uses Bollinger logic to combine low-order events to analyze unwanted states in the system. Fault tree analysis is mainly used in the fields of safety engineering ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of software test verification, and provides a security-critical software verification method and device, equipment and a medium. The method comprises the following steps: expanding an FTA model based on an LTL language to obtain a formalized system security constraint condition and a corresponding software demand specification; matching the software requirement specification with a software specification symbol of the MBD according to a pre-formulated conversion rule, so that the software requirement specification is converted into a security specification model; and inputting the security protocol model and the pre-generated SCADE software design model into a model verifier to complete security verification of the software. By adopting the technical scheme of the embodiment of the invention, the security constraint condition and the software requirement specification corresponding to the security constraint condition are enabled to meet the formalized characteristics through extension of the LTL language, and meanwhile, the software requirement specification can be converted into the security specification model according to the pre-formulated conversion rule, and the security specification model is input into the model verifier for verification; the interference of human factors in a safety verification method is avoided, and the reliability is improved.

Description

technical field [0001] The invention relates to the technical field of software testing and verification, in particular to a safety-critical software verification method, device, equipment and medium. Background technique [0002] Modern safety-critical electronic systems are transitioning to software-intensive systems. The proportion of functions undertaken by software in the system continues to increase, making software security critical to system security. Therefore, it is urgent to explore a reasonable software verification method that conforms to the development trend, and how to effectively verify complex software has become a difficult point in software security work. [0003] At present, the mainstream software security verification method is to capture the security requirements of the software through the security analysis method, and combine the formal verification technology to complete the verification of the software. The formal verification technology adopted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F8/10
CPCG06F11/3604G06F8/10
Inventor 吴康朱守园牟明于沛赵文
Owner 中航机载系统共性技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products