Skip to main content

Safety Licensing and Formal Correctness of High Integrity Embedded Systems

  • Conference paper
Real Time Computing

Part of the book series: NATO ASI Series ((NATO ASI F,volume 127))

  • 170 Accesses

Abstract

This paper describes techniques for applying formal mathematical methods to the specification and design of high integrity embedded control systems which are implemented using microprocessors and real-time software. For reasons of public policy, including preservation of human life and protection of the environment of the Earth, certain classes of control systems in industries such as aviation and nuclear power are subject to independent analysis and certification, before operational use is permitted. The techniques described in this paper are intended to provide a practical route for the development of such highly critical systems. By combining the specification language Higher Order Logic (HOL) with the disciplined use of annotated subsets of the computer programming languages such as Ada, a framework has been developed for the development of the operational software for practical safety-critical equipment. A worked example, of an electronic speed control mechanism for road vehicles, is used to illustrate some of the steps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. British Computer Society Monograph on the Specification, Design and Verification of Safety- Critical Software,edited by B.A. Wichmann, 1991.

    Google Scholar 

  2. Bromell, J.Y., Sadler, S.J., A Strategy for the Development of Safety-critical Software, in: Achieving Safety and Reliability with Computer Systems, ed. B.K. Daniels, Elsevier Applied Science, 1987.

    Google Scholar 

  3. Carré, B.A., Reliable Programming in Standard Languages in High Integrity Software, edited by C. Sennett, Pitman Publishing, 1989.

    Google Scholar 

  4. Carré, B.A., SPARK - The SPADE Ada Kernel, Program Validation Limited, Southampton, UK, 1989.

    Google Scholar 

  5. Cohen, B., Harwood, W.T., Jackson, M.I., The Specification of Complex Systems, Addison-Wesley Publishing Company 1989.

    Google Scholar 

  6. Cullyer, W.J., Goodenough, S.J., Wichmann B A, The Choice of Computer Languages for Use in Safety-Critical Systems, Software Engineering Journal, Vol 6, No 2, 1991, 51–58.

    Article  Google Scholar 

  7. Cullyer, W. J., Safety-Critical Control Systems, Computer and Control Engineering Journal, Vol. 2, No. 5, September 1991, 202–210.

    Article  Google Scholar 

  8. Cullyer, W.J., Application of Formal Methods to Highly Reliable Software for Spacecraft and for the DSN, NASA Jet Propulsion Laboratory Report, May 1992.

    Google Scholar 

  9. Fagan, M., Design and Code Inspections to Reduce Errors in Code Development, IBM Systems Journal, Vol. 15, No 3, 1976.

    Google Scholar 

  10. Goodall, R.M., High Speed Digital Controllers Using an 8 Bit Microprocessor Software and Microsystems, Vol. 4, 1985, 109–116.

    Google Scholar 

  11. Gordon, M. J., A Proof Generating System for Higher-Order Logic, Kluwer Academic Publishers, 1987.

    Google Scholar 

  12. Hale, R.S., Programming in Temporal Logic, Computer Laboratory, University of Cambridge, Report No. 173, July 1989.

    Google Scholar 

  13. Jones, C.B., Systematic Software Development Using VDM, Prentice Hall International, 1986.

    Google Scholar 

  14. Leveson, N.G., Harvey, P.R., Analyzing Software Safety, IEEE Transactions on Software Engineering SE-9, No. 9, 1983.

    Google Scholar 

  15. McDermid, J., Assurance in High-Integrity Software, in: High Integrity Software, edited by C. Sennett, Pitman Publishing 1989.

    Google Scholar 

  16. Parnas, D.L., van Schouwen, J., Kwan, S.P., Evaluation of Safety-Critical Software, Communications of the ACM, Vol. 3, June 1990.

    Google Scholar 

  17. Spivey, J.M., The Z Notation, Prentice Hall International, 1988.

    Google Scholar 

  18. A Guide to the Methods and Software Tools for the Construction of Large Real Time Systems,STARTS Guide, 2nd edition, Vol. 1–2, UK National Computing Centre, Manchester, UK, 1987.

    Google Scholar 

  19. Tran, S.C., Applications of Formal Methods in Engineering, Ph.D. thesis, Department of Engineering, University of Warwick, UK, May 1992.

    Google Scholar 

  20. Wichmann, B.A., Insecurities in the Ada Language, National Physical Laboratory, Teddington UK, report DITC 137 /89, 1989.

    Google Scholar 

  21. Woodcock, J., Loomes, M., Software Engineering Mathematics, Pitman Publishing, 1988.

    Google Scholar 

  22. Wong, W., Application of Higher Order Logic to Railway Signalling and Interlocking, Ph.D. thesis, Department of Engineering, University of Warwick, UK, March 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cullyer, J. (1994). Safety Licensing and Formal Correctness of High Integrity Embedded Systems. In: Halang, W.A., Stoyenko, A.D. (eds) Real Time Computing. NATO ASI Series, vol 127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-88049-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-88049-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-88051-3

  • Online ISBN: 978-3-642-88049-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics