[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3377816.3381728acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
short-paper

Synthesis of assurance cases for software certification

Published: 18 September 2020 Publication History

Abstract

As software is rapidly being embedded into major parts of our society, ranging from medical devices and self-driving vehicles to critical infrastructures, potential risks of software failures are also growing at an alarming pace. Existing certification processes, however, suffer from a lack of rigor and automation, and often incur a significant amount of manual effort on both system developers and certifiers. To address this issue, we propose a substantially automated, cost-effective certification method, backed with a novel analysis synthesis technique to automatically generate application-specific analysis tools that are custom-tailored to producing the necessary evidence. The outcome of this research promises to not only assist software developers in producing safer and more reliable software, but also benefit industrial certification agencies by significantly reducing the manual effort of certifiers. Early validation flows from experience applying this approach in constructing an assurance case for a surgical robot system in collaboration with the Center for the Advanced Surgical Technology.

References

[1]
The Center for Advanced Surgical Technology. https://www.unmc.edu/cast/.
[2]
D. Alrajeh, J. Kramer, A. Russo, and S. Uchitel. Learning operational requirements from goal models. In ICSE, pages 265--275, 2009.
[3]
T. Carlson and E. Van Wyk. Type Qualifiers As Composable Language Extensions. In Proceedings of GPCE, pages 91--103, 2017.
[4]
C. David, P. Kesseli, D. Kroening, and M. Lewis. Program Synthesis for Program Analysis. ACM Trans. Program. Lang. Syst., 40(2):5:1--5:45, May 2018.
[5]
W. Dietl, S. Dietzel, M. D. Ernst, K. Muşlu, and T. W. Schiller. Building and Using Pluggable Type-checkers. In Proceedings of ICSE, pages 681--690, 2011.
[6]
J. S. Foster, M. Fähndrich, and A. Aiken. A theory of type qualifiers. In PLDI, pages 192--203, 1999.
[7]
D. Giannakopoulou, C. S. Pasareanu, and H. Barringer. Assumption generation for software component verification. In ASE, pages 3--12, 2002.
[8]
C. S. Gordon. Synthesizing program-specific static analyses. https://arxiv.org/abs/1810.06600, 2018.
[9]
I. Incer, A. Sangiovanni-Vincentelli, C.-W. Lin., and E. Kang. Quotient for Assume-Guarantee Contracts. In Proceedings of MEMOCODE, 2018.
[10]
D. Jackson. Software Abstractions: Logic, language, and analysis. MIT Press, 2006.
[11]
D. Jackson. Software for Dependable Systems: Sufficient Evidence? National Academies Press, 2007.
[12]
T. Kelly and R. Weaver. The goal structuring notation-a safety argument notation. In Dependable Systems and Networks (DSN) Workshop on Assurance Cases, 2004.
[13]
É. Leverett, R. Clayton, and R. Anderson. Standardisation and certification of the internet of things. In Proceedings of WEIS, 2017.
[14]
N. Mansoor, J. A. Saddler, B. Silva, H. Bagheri, M. B. Cohen, and S. Farritor. Modeling and testing a family of surgical robots: an experience report. In Proceedings of ESEC/FSE, 2018.
[15]
J. P. Near, A. Milicevic, E. Kang, and D. Jackson. A lightweight code analysis and its role in evaluation of a dependability case. In ICSE, pages 31--40. ACM, 2011.
[16]
S. Pernsteiner, C. Loncaric, E. Torlak, Z. Tatlock, X. Wang, M. D. Ernst, and J. Jacky. Investigating safety of a radiotherapy machine using system models with pluggable checkers. In Proceedings of CAV, pages 23--41, 2016.
[17]
U.S. Food and Drug Administration (FDA). List of Device Recalls. https://www.fda.gov/medicaldevices/safety/listofrecalls. Accessed: 2018-11-14.
[18]
U.S. Food and Drug Administration (FDA). General principles of software validation; final guidance for industry and fda staff. httpsr://www.fda.gov/downloads/medicaldevices/.../ucm085371.pdf, 2017.
[19]
J. Xiang, J. C. Knight, and K. J. Sullivan. Real-world types and their application. In Proceedings of SAFECOMP, pages 471--484, 2015.

Cited By

View all
  • (2025)Systematic mapping study on requirements engineering for regulatory compliance of software systemsInformation and Software Technology10.1016/j.infsof.2024.107622178(107622)Online publication date: Feb-2025
  • (2024)Neuro-Symbolic Approach to Certified Scientific Software SynthesisProceedings of the 1st ACM International Conference on AI-Powered Software10.1145/3664646.3664776(147-150)Online publication date: 10-Jul-2024
  • (2024)Scalable Relational Analysis via Relational Bound PropagationProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639171(1-12)Online publication date: 20-May-2024
  • Show More Cited By

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE-NIER '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results
June 2020
128 pages
ISBN:9781450371261
DOI:10.1145/3377816
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

  • KIISE: Korean Institute of Information Scientists and Engineers
  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 September 2020

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Short-paper

Funding Sources

Conference

ICSE '20
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Systematic mapping study on requirements engineering for regulatory compliance of software systemsInformation and Software Technology10.1016/j.infsof.2024.107622178(107622)Online publication date: Feb-2025
  • (2024)Neuro-Symbolic Approach to Certified Scientific Software SynthesisProceedings of the 1st ACM International Conference on AI-Powered Software10.1145/3664646.3664776(147-150)Online publication date: 10-Jul-2024
  • (2024)Scalable Relational Analysis via Relational Bound PropagationProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639171(1-12)Online publication date: 20-May-2024
  • (2022)Combining solution reuse and bound tightening for efficient analysis of evolving systemsProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3533767.3534399(89-100)Online publication date: 18-Jul-2022
  • (2022)ATR: template-based repair for Alloy specificationsProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3533767.3534369(666-677)Online publication date: 18-Jul-2022
  • (2021)Automated Method for Assurance Case Construction from System Design Models2021 5th International Conference on System Reliability and Safety (ICSRS)10.1109/ICSRS53853.2021.9660735(230-239)Online publication date: 24-Nov-2021
  • (2021)Safety Case Maintenance: A Systematic Literature ReviewComputer Safety, Reliability, and Security10.1007/978-3-030-83903-1_8(115-129)Online publication date: 25-Aug-2021
  • (2021)Automating the Assembly of Security Assurance Case FragmentsComputer Safety, Reliability, and Security10.1007/978-3-030-83903-1_7(101-114)Online publication date: 25-Aug-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media