Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for screening security subset of security-critical software modeling language

A modeling language, screening method technology, applied in the direction of computer security devices, model-driven code, creation/generation of source code, etc., can solve the problem that the security subset cannot meet the safety-critical software, lack of adequacy, necessity and security , the code has security risks and other issues, to ensure the necessity, good interface, and clear functions

Active Publication Date: 2021-04-02
中国航发控制系统研究所
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Safety subsets play an important role in modeling safety-critical software, but are prone to lack of sufficiency, necessity, and safety
When the sufficiency is insufficient, the safety subset cannot meet the needs of safety-critical software development; when the necessity is insufficient, the safety subset will have repeated or similar elements, and the elements with repeated functions will lead to the same logic may produce different choices and Different results are designed, and elements with similar functions are likely to cause errors in use; when the security is insufficient, the elements of the safe subset cannot generate code or the generated code has security risks, and the elements of the safe subset do not have clear functions. The interface and good graphic display make the model designer make mistakes due to misunderstanding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for screening security subset of security-critical software modeling language

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0023] A method for managing safety-critical software modeling language safety subsets described in the present invention includes: figure 1 The steps shown, specifically:

[0024] (1) Establish a complete vocabulary set of the modeling language according to the instruction manual of the original modeling language;

[0025] (2) Carry out a necessity analysis on the complete vocabulary set of the modeling language, remove unsafe elements from the complete vocabulary set, and establish a preliminary screening version of the safe subset;

[0026] (2.1) Traverse the complete vocabulary set of the modeling language and eliminate elements that cannot generate code;

[0027] (2.2) Traversing the complete vocabulary set of the modeling language, analyzing the icons, input and output interfaces, and usage methods of modeling elements, eliminating ele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for screening a security subset of a security-critical software modeling language. The method comprises the following steps: (1) establishing a complete vocabulary setof the modeling language; (2) removing unsafe elements from the complete vocabulary set, and establishing a preliminary screening version of a safe subset; (3) establishing a target domain programming element set; (4) carrying out adequacy analysis of the security subsets; and (5) carrying out safety verification of the safety subset. The method provided by the invention ensures the sufficiency,necessity and security of the security subset, so that the security subset not only can meet the requirements of security critical software development, but also avoids the problems caused by repeatedelement functions in the security subset, thereby generating a modeling language with extremely high security.

Description

technical field [0001] The invention belongs to the field of software development, in particular to a method for screening safety-critical software modeling language safety subsets. Background technique [0002] Fields such as aerospace impose stringent requirements on the safety of software that can lead to catastrophic risks, known as safety-critical software. Software development requires the use of programming languages, and each programming language defines the vocabulary and grammar it uses to form a corresponding vocabulary set and grammar set. In order to avoid the problems of the programming language itself from introducing design defects, the development of safety-critical software must further restrict the vocabulary and grammar of the selected programming language, so as to establish a safe subset of the programming language, and then develop software products based on this . [0003] Model-based software design uses a graphical modeling language to build model...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F8/35
CPCG06F21/125G06F8/35
Inventor 朱理化周彰毅张春黄浩
Owner 中国航发控制系统研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products