Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for obtaining universal security demand of embedded software

A technology of embedded software and acquisition method, which is applied in software testing/debugging, instrumentation, electrical digital data processing, etc., can solve the problems of lack of comprehensiveness and scalability, improve comprehensiveness and scalability, reduce casualties and Economic property loss, the effect of avoiding human casualties and economic property loss

Active Publication Date: 2018-03-13
BEIHANG UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for acquiring general security requirements of embedded software, which can effectively improve the comprehensiveness of general security requirements acquisition of embedded software, in view of the lack of comprehensiveness and scalability in the acquisition of general security requirements in the prior art. and scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining universal security demand of embedded software
  • Method for obtaining universal security demand of embedded software
  • Method for obtaining universal security demand of embedded software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and effect of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] refer to figure 1 , the present embodiment provides a method for acquiring general security requirements of embedded software, including:

[0056] Step S101, obtaining static structural elements and dynamic operating structural elements of the embedded software according to the static modeling mechanism and the dynamic modeling mechanism;

[0057] Step S102, acquiring failure modes of each of the static structural elements and dynamic operating structural elements;

[0058] Step S103, setting security measures for each of the failure modes to obtain general security requirements;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for obtaining a universal security demand of embedded software. The method comprises the steps of obtaining static structure elements and dynamic running structure elements of the embedded software according to a static modeling mechanism and a dynamic modeling mechanism respectively; obtaining failure modes of the static structure elements and the dynamic runningstructure elements; setting security measures for the failure modes, and obtaining the universal security demand; and tailoring the universal security demand. According to the method, the comprehensiveness and expansibility of obtaining the universal demand of the embedded software can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of software security development, in particular to a method for acquiring general security requirements of embedded software. Background technique [0002] With the widespread application of embedded software in safety-critical fields, such as military, nuclear energy, aviation, aerospace, medical, automobile and other fields, software safety has become a research hotspot. A large number of studies have shown that most of the failures and failures (especially those that violate safety) come from the omission or misunderstanding of requirements. Likewise, Leveson's research shows that in space engineering, a considerable number of software-related failures are related to flawed requirements or misunderstood software goals. As the software development lifecycle progresses, the cost of correcting software glitches and errors increases significantly. [0003] The beginning and key of the entire software securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3616
Inventor 鲍晓红付荣荣钟德明赵庭弟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products