Using Bounded Model Checking for Coverage Analysis of Safety-Critical Software in an Industrial Setting

被引:15
|
作者
Angeletti, Damiano [2 ]
Giunchiglia, Enrico [1 ]
Narizzano, Massimo [1 ]
Puddu, Alessandra [1 ]
Sabina, Salvatore [2 ]
机构
[1] Univ Genoa, DIST, I-16145 Genoa, Italy
[2] Ansaldo STS, I-16151 Genoa, Italy
关键词
Automatic test generation; Testing; Bounded model checking; GENERATION;
D O I
10.1007/s10817-010-9172-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Testing and Bounded Model Checking (BMC) are two techniques used in Software Verification for bug-hunting. They are expression of two different philosophies: testing is used on the compiled code and it is more suited to find errors in common behaviors, while BMC is used on the source code to find errors in uncommon behaviors of the system. Nowadays, testing is by far the most used technique for software verification in industry: it is easy to use and even when no error is found, it can release a set of tests certifying the (partial) correctness of the compiled system. In the case of safety critical software, in order to increase the confidence of the correctness of the compiled system, it is often required that the provided set of tests covers 100% of the code. This requirement, however, substantially increases the costs associated to the testing phase, since it often involves the manual generation of tests. In this paper we show how BMC can be productively applied to the Software Verification process in industry. In particular, we show how to productively use a Bounded Model Checker for C programs (CBMC) as an automatic test generator for the Coverage Analysis of Safety Critical Software.
引用
收藏
页码:397 / 414
页数:18
相关论文
共 50 条
  • [21] Perspectives on safety-critical software
    Bhansali, PV
    AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE - PROCEEDINGS, 1997, : 108 - 109
  • [22] Verification of Safety-Critical Software
    Andersen, B. Scott
    Romanski, George
    COMMUNICATIONS OF THE ACM, 2011, 54 (10) : 52 - 57
  • [23] Testing safety-critical software
    Nikolaropoulos, E
    HEWLETT-PACKARD JOURNAL, 1997, 48 (03): : 89 - 94
  • [24] Firm Deadline Checking of Safety-Critical Java']Java Applications with Statistical Model Checking
    Ravn, Anders P.
    Thomsen, Bent
    Luckow, Kasper Soe
    Leth, Lone
    Bogholm, Thomas
    MODELS, ALGORITHMS, LOGICS AND TOOLS: ESSAYS DEDICATED TO KIM GULDSTRAND LARSEN ON THE OCCASION OF HIS 60TH BIRTHDAY, 2017, 10460 : 269 - 288
  • [25] EVALUATION OF SAFETY-CRITICAL SOFTWARE
    PARNAS, DL
    VANSCHOUWEN, AJ
    KWAN, SP
    COMMUNICATIONS OF THE ACM, 1990, 33 (06) : 636 - 648
  • [26] A software diversity model for embedded safety-critical system
    Wang, Haifeng
    Liang, Nan
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND INFORMATION SYSTEMS, 2009, : 106 - 109
  • [27] Software FMEA for Safety-Critical System Based on Co-analysis of System Model and Software Model
    Li, Guoqi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (12): : 3101 - 3105
  • [28] An Ontological Analysis of Safety-Critical Software and Its Anomalies
    Liu, Hezhen
    Jin, Zhi
    Zheng, Zheng
    Huang, Chengqiang
    Zhang, Xun
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 311 - 320
  • [29] A tool for the design and analysis of software safety-critical systems
    Gill, JA
    Ferguson, F
    INFORMATION REUSE AND INTEGRATION, 2001, : 127 - 132
  • [30] Challenges in Flexible Safety-Critical Software Development - An Industrial Qualitative Survey
    Notander, Jesper Pedersen
    Host, Martin
    Runeson, Per
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, 2013, 7983 : 283 - 297