Qualification of Proof Assistants, Checkers, and Generators: Where Are We and What Next?

02/19/2023
by   Mario Gleirscher, et al.
0

Cyber-physical systems, such as learning robots and other autonomous systems, employ high-integrity software in their safety-critical control. This software is developed using a range of tools some of which need to be qualified for this purpose according to international standards. In this article, we first evaluate the state of the art of tool qualification for proof assistants, checkers (e.g., model checkers), and generators (e.g., code generators, compilers) by means of a SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis. Our focus is on the qualification of tools in the three mentioned categories. Our objective is to assess under which conditions these tools are already fit or could be made fit for use in the practical engineering and assurance of high-integrity control software. In a second step, we derive a viewpoint and a corresponding range of suggestions for improved tool qualification from the results of our SWOT analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2018

Control Behavior Integrity for Distributed Cyber-Physical Systems

Cyber-physical control systems, such as industrial control systems (ICS)...
research
10/05/2019

Testing and verification of neural-network-based safety-critical control software: A systematic literature review

Context: Neural Network (NN) algorithms have been successfully adopted i...
research
06/24/2018

Cyber-Physical Specification Mismatches

Embedded systems use increasingly complex software and are evolving into...
research
08/09/2021

A Concept for a Qualifiable (Meta)-Modeling Framework Deployable in Systems and Tools of Safety-critical and Cyber-physical Environments

The development of cyber-physical systems can significantly benefit from...
research
09/04/2018

Software Professionals' Attitudes towards Video as a Medium in Requirements Engineering

In requirements engineering (RE), knowledge is mainly communicated via w...
research
02/07/2020

Assuring Automotive Data and Software Integrity Employing Distributed Hash Tables and Blockchain

Automotive software is increasingly complex and critical to safe vehicle...
research
08/06/2021

A Smart and Defensive Human-Machine Approach to Code Analysis

Static analysis remains one of the most popular approaches for detecting...

Please sign up or login with your details

Forgot password? Click here to reset