Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A software system security verification and evaluation method based on aadl model extension

A software system and security technology, applied in platform integrity maintenance, electrical digital data processing, instruments, etc., can solve the problems of direct processing of difficult system models, computational redundancy, huge computational cost, etc., to improve the accuracy of evaluation. Effect

Active Publication Date: 2021-07-13
HARBIN INST OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem that the existing AADL model-based verification evaluation is difficult to directly process the system model, which requires a huge calculation cost and contains a lot of redundancy in the calculation, and proposes an AADL model-based extension Software System Security Verification and Evaluation Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software system security verification and evaluation method based on aadl model extension
  • A software system security verification and evaluation method based on aadl model extension
  • A software system security verification and evaluation method based on aadl model extension

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0018] Specific implementation mode one: the software system security verification and evaluation method based on the AADL model extension of this implementation mode, such as figure 1 shown, including:

[0019] Step 1. Determine the risk factor list of the system to be evaluated, and establish a mapping relationship between each risk factor in the risk factor list and the AADL error model attachment according to the preset grammatical rules; then establish a mapping relationship between the AADL error model attachment and the AADL architecture model, In order to establish the relationship between the risk factors and the AADL framework model; and the set of all established relationships is called the mechanism generation model. For example, the list of risk factors determined for a certain flight control software may include abnormal bus voltage, abnormal power supply of a single aircraft, failed self-test of a single aircraft, inaccurate navigation calculation, incorrect tim...

specific Embodiment approach 2

[0025] Specific embodiment two: the difference between this embodiment and specific embodiment one is: the software system security verification and evaluation method based on AADL model expansion also includes step seven (such as image 3 shown):

[0026] The AADL error model attachment in step 1 is mapped and converted to obtain the Markov chain; the probability calculation of the Markov chain is performed to obtain the component hazard probability; the combination of component hazard probabilities is calculated to obtain the system hazard probability; sex assessment results.

[0027] Other steps and parameters are the same as those in Embodiment 1.

specific Embodiment approach 3

[0028] Specific embodiment three: the difference between this embodiment and specific embodiment one or two is that in step one, the mapping relationship between each risk factor in the risk factor list and the AADL error model attachment is established according to the preset grammatical rules:

[0029] Map the key tasks in the main task process to the initial state in the AADL model attachment; map the error handling process in the key person to the error state in the AADL model attachment; map the elements in the risk factor list to error events; map the task's The execution sequence is mapped to the logical relationship and propagation path between components.

[0030] Other steps and parameters are the same as those in Embodiment 1 or Embodiment 2.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software system security verification and evaluation method based on AADL model extension, which aims to solve the problem that the existing verification and evaluation based on the AADL model is difficult to directly process the system model, and a huge calculation cost is required, and the calculation contains It is proposed due to the shortcomings of a large number of redundancy, including: linking risk factors with the AADL architecture model to form a mechanism generation model; extracting model elements and generating time state fault trees, hardware and software impact analysis trees, and common cause and time-effect analysis trees based on model elements , and invert the risk generation path from bottom to top according to the tree structure; set the performance and capacity of the physical resources of each physical device; and calculate the failure probability of the physical device according to the probability of the marked risk factor of the physical device; The AADL security model is converted into a time automaton model; the formal verification tool UPPAAL is called to analyze and verify the time automata model; the invention is applicable to the security assessment of software and hardware systems.

Description

technical field [0001] The invention relates to the technical field of software system security analysis, in particular to a software system security verification and evaluation method based on AADL model extension. Background technique [0002] In a complex hybrid system of software and hardware, the increasing scale of software and the rapid increase of system complexity have brought important challenges in software security assurance. [0003] AADL is a modeling language for modeling safety-critical systems with resource (size, weight, power) constraints and stringent real-time response requirements. AADL can describe the dynamic behavior of the runtime architecture. These descriptions enable the analysis of components and systems, and the analysis and evaluation of system performance can be completed before system coding. [0004] AADL error attachment is a standard extension of the AADL model. AADL error attachment declares a set of error state (Error State), error eve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/57G06F2221/033
Inventor 孙超高昕睿许永辉刘晓东
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products