CN109634600B - Code generation method based on security extension SysML and AADL models - Google Patents

Code generation method based on security extension SysML and AADL models Download PDF

Info

Publication number
CN109634600B
CN109634600B CN201811273773.1A CN201811273773A CN109634600B CN 109634600 B CN109634600 B CN 109634600B CN 201811273773 A CN201811273773 A CN 201811273773A CN 109634600 B CN109634600 B CN 109634600B
Authority
CN
China
Prior art keywords
sysml
aadl
model
design model
converting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811273773.1A
Other languages
Chinese (zh)
Other versions
CN109634600A (en
Inventor
张琛
牛欣怡
鱼滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201811273773.1A priority Critical patent/CN109634600B/en
Publication of CN109634600A publication Critical patent/CN109634600A/en
Application granted granted Critical
Publication of CN109634600B publication Critical patent/CN109634600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/35Creation or generation of source code model driven
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/34Graphical or visual programming

Abstract

The invention discloses a code generation method based on security extension SysML and AADL model, which is used for converting the system requirement to be converted into a structured language code by using the SysML and AADL model of the security extension when facing to realize a high-security real-time response system; a formal verification method is added, so that errors can be found as early as possible and corrected in time, and the design errors are prevented from being transmitted to the next stage; the method provided by the invention is used for code conversion, so that the accuracy of code conversion is improved and the manpower is saved.

Description

Code generation method based on security extension SysML and AADL models
Technical Field
The invention relates to a code generation method, in particular to a code generation method based on security extensions SysML and AADL models.
Background
When some high-safety real-time response systems such as avionics systems and the like are designed and built, although a System modeling Language (SysML) can be used for completely describing functions, layers, interconnection relations among objects, interaction behaviors of the objects in the System, tracing relations among requirements and satisfying relations of the design to the requirements, the description of the performance, the real-time performance, the safety, the reliability and other characteristics of the complex System is not supported, so that a System Model description method meeting the requirements of performance indexes and five-sex requirements needs to be designed, and the SysML Language is in a semi-formal description mode and is lack of analysis and verification means.
When a high-safety real-time response system is realized by the conventional code generation method, after the functions and the performances of the system are analyzed and confirmed, the system needs to be independently subjected to architecture design, the functions and the performances are corresponding to software and hardware, the description of system software components, hardware components and system components is realized, and the method is complex and is easy to make mistakes.
Disclosure of Invention
The invention aims to provide a code automatic generation method based on SysML and AADL models of security extension, which is used for solving the problems that the code automatic generation method in the prior art does not meet the description of security and is easy to make mistakes due to lack of means of analysis and verification when a high-security real-time response system is realized.
In order to realize the task, the invention adopts the following technical scheme:
a code generation method based on security extension SysML and AADL model is used for converting system requirements into structured language codes, and the method carries out security extension on the original SysML to obtain the SysML after the security extension; describing system requirements by using the SysML after the safety expansion, and obtaining a SysML model of the system requirements; converting the system requirements SysML model to an AADL architecture design model; carrying out consistency verification on the AADL system structure design model and the system requirement SysML model; and after the verification is passed, converting the AADL system structure design model into a structured language code.
The invention also has the following technical characteristics:
optionally, the method is performed according to the following steps:
step 1, carrying out safety expansion on the original SysML to obtain the SysML after the safety expansion;
the specific process of the safety extension is as follows:
obtaining a plurality of error models by adding a plurality of constraints, mark values and structure types for describing safety in the original SysML, and obtaining the SysML after safety expansion;
step 2, describing system requirements by adopting the SysML after the safety expansion, and obtaining a SysML model of the system requirements;
step 3, converting the system requirement SysML model into an AADL (architecture design model) system structure;
step 4, carrying out consistency verification on the AADL system structure design model obtained in the step 3 and the system requirement SysML model obtained in the step 2;
the consistency verification comprises the following specific processes:
step 41, constructing a real-time interface automaton according to the AADL architecture design model;
step 42, obtaining a PPTL formula required by the system;
43, detecting the PPTL formula by using the real-time interface automatic machine, if the detection result is correct, the AADL system structure design model is consistent with the system requirement SysML model, and executing the step 5; otherwise, returning to the step 3;
and 5, converting the AADL system structure design model into a structured language code.
Optionally, when the system requirement SysML model is converted into the AADL architecture design model in step 3, the security constructors, requirement diagrams, module definition diagrams and internal module diagrams in the system requirement SysML model are converted into software components, hardware components and composite components of the AADL architecture design model;
the method specifically comprises the following steps:
for all requirements described by the requirement diagram, converting a plurality of requirements with attributes of software implementation into software components of an AADL architecture design model, converting a plurality of requirements with attributes of hardware implementation into hardware components of the AADL architecture design model, and converting a plurality of requirements with attributes of software and hardware cooperation implementation into composite components of the AADL architecture design model;
for all modules of the module definition map, converting each module into a composite component of the AADL architecture design model;
for all modules of the internal block diagram, converting each module into a composite component of the AADL architecture design model;
and converting the security constructor into a security accessory of an AADL architecture design model.
Optionally, in step 5, the AADL architecture design model obtained in step 3 is converted into a C language code.
Optionally, when the AADL architecture design model is converted into a C language code, mapping a software component in the AADL architecture design model into the C language code.
Compared with the prior art, the invention has the following technical characteristics:
1. firstly, carrying out security extension on SysML, and supporting the description of an embedded real-time system on security;
2. the method provided by the invention is added with a formal verification method, so that errors can be found as early as possible and corrected in time, and the design errors are prevented from being propagated to the next stage;
3. the method provided by the invention can automatically convert the demand model described by SysML into the architecture model described by AADL, thereby improving the accuracy of model conversion and saving manpower; the method provided by the invention can automatically convert the architecture model described by the AADL model into the C language code, thereby improving the accuracy of code conversion and saving manpower.
Drawings
Fig. 1 is a flowchart of an automatic code generation method provided by the present invention.
Detailed Description
Structured language: the method has the characteristics of strong flexibility and rich expression of natural language, and has the characteristics of clearness and readability and strict logic of a structured program. The structured language directly supports the structured control structure and has strong process structure and data structure capability. The languages PASCAL, C, Ada are their prominent representatives.
The system modeling language SysML: a graphical modeling language that enables visualization of important aspects of system design such as structure, behavior, requirements, and parameters, that is, SysML provides a complete, consistent, and traceable system design based on system requirements.
Architecture Analysis and Design Language (AADL): the standard modeling language of the embedded real-time system language can be integrated with a system model based on SysML language upwards and can be integrated with a software engineering platform based on the model downwards. In the complex embedded real-time system, after the system functions are analyzed and confirmed, the system needs to be subjected to architecture design, and the functions are correspondingly bound to software and hardware, so that the description of system software components, hardware components and system components is realized. The AADL model describes a hierarchy of system software and hardware components, providing a set of predefined component classes, including: software components (threads, thread groups, subroutines, data, and procedures), hardware components (processors, memory buses, devices, virtual processors, and virtual buses), and composite components (systems, which consist of software components and hardware components), the conversion of the AADL model into C language code may be achieved through mapping rules.
System requirements: functional and performance requirements of the system, including: system function, performance, and characteristics such as real-time, security, reliability.
Constraints, tag values, and configuration: the extension mechanism of SysML is achieved by adding constraints, tag values, and constructors. Constraints are semantic restrictions expressed in a literal expression. The tag value is a pair of a string, a tag string and a string value, storing some information value about the element. The constructor is to construct a new model element on the basis of a defined element model. For example: defining a construct type data security describes data security, defining a constraint { consistency, integrity, availability } describes data consistency, confidentiality, integrity, availability.
Error model: software for describing different types of error conditions, such as error models in security for ATM machines including password entry errors, may be subject to security errors when used.
Mapping rules of SysML model to AADL model: the method comprises the conversion rules from a requirement diagram in a SysML model, a module definition diagram, an internal module diagram to a software component, a hardware component, a composite component, a behavior accessory and a safety accessory in an AADL model.
Mapping rule of AADL model to C language code: the conversion rule comprises conversion rules of software components, system components, process components, thread components, data components and subprogram components in the AADL model into C language, C files and h files.
The following are specific examples given by the inventors for further explanation of the technical solutions provided by the present invention.
The embodiment discloses a code automatic generation method of SysML and AADL models based on safety extension, which carries out safety extension on original SysML to obtain the SysML after the safety extension; describing system requirements by using the SysML after the safety expansion, and obtaining a SysML model of the system requirements; converting the system requirements SysML model to an AADL architecture design model; carrying out consistency verification on the AADL system structure design model and the system requirement SysML model; and after the verification is passed, converting the AADL system structure design model into a structured language code.
In this embodiment, the function and performance requirements are extracted from the system to be converted, and a requirement model is constructed for the system by using SysML, where the system requirement refers to what function the system to be implemented needs to implement or what the system to be implemented is constructed, and then the requirement model is automatically converted into an architecture model described in AADL, and finally converted into a structured language code. For example, an ATM is designed and software is finally developed in the form of C language, and the idea of the method provided by the present invention is: using SysML to construct a demand model for functional demands and performance demands on the ATM, wherein in the embodiment, system demands comprise functional demands such as inputting deposit and withdrawal amount and inquiring account balance, and safety performance demands such as identity encryption; converting the system requirement model described by the SysML into an architecture model described by AADL, wherein the AADL model defines what components are used for realizing the requirements, for example, process components in corresponding software components in the architecture model are used for realizing the requirement of inputting the deposit and withdrawal amount; finally, the architecture model is converted into C language code according to AADL-to-C mapping rules.
The method comprises the following steps:
because the SysML language does not support the description of the characteristics of real-time property, safety, reliability and the like, at present, a large number of embedded systems need to meet the requirements of high safety and real-time response, and firstly, the original SysML needs to be subjected to safety extension.
Step 1, carrying out safety expansion on an original SysML for a real-time response system needing to meet high safety, and obtaining the SysML after the safety expansion;
the SysML after the security extension has a plurality of security constructors, for example, when the ATM machine withdrawal process is modeled, the constructor for describing identity encryption needs to be added into the original withdrawal requirement.
Obtaining a plurality of error models by adding a plurality of constraints, mark values and structure types for describing safety in the original SysML, and obtaining the SysML after safety expansion;
in this embodiment, the construction types describing various types of security are added according to the SysML grammar rule, and a constraint expression and a tag value (key value pair) are added to establish a multi-type error model modeling manner, so as to form an error model 1, an error model 2, … …, where the error model n, n is a positive integer, and obtain the SysML after the security extension, and in this embodiment, the error model exists on the SysML.
Step 2, describing system requirements by adopting the SysML after the safety expansion, and obtaining a SysML model of the system requirements;
optionally, in the step 2, the system requirements are described by using the SysML after the security extension, and when the SysML model of the system requirements is obtained, the SysML model of the system requirements includes a security configuration model, a requirement diagram, a module definition diagram, and an internal module diagram.
In the embodiment, when the embedded system requirements are modeled by the SysML, the available models mainly include a requirement diagram, an application diagram, a module definition diagram and an internal module diagram. When modeling is carried out by using a SysML modeling tool, a use diagram and a requirement diagram are used for identifying system functions and capturing system requirements, and a module definition diagram and an internal module diagram are used for describing the overall structure of the system and the internal structure of a single module;
step 3, converting the system requirement SysML model into an AADL (architecture design model) system structure;
when the system requirement SysML model is converted into an AADL architecture design model in the step 3, converting a safety construction type, a requirement diagram, a module definition diagram and an internal module diagram in the system requirement SysML model into a software component, a hardware component and a composite component of the AADL architecture design model;
in the process of converting the requirement model into the architecture model, all system requirement information comes from the requirement diagram, the module definition diagram and the internal module diagram, and system functions identified in the diagram can be completely represented in the requirement diagram. Therefore, before converting the SysML into the AADL, the mapping rule from the requirement diagram, the module definition diagram, and the internal module diagram in the SysML to the AADL model needs to be designed.
Optionally, the mapping rule of the SysML model to the AADL model in step 3 includes:
for the requirement graph described by SysML, each requirement can be converted into a group of system components of the composite component in AADL, each software implementation part in the requirement is converted into one software component in the composite component, and each hardware implementation part is converted into one hardware component in the composite component;
all modules in the module definition graph can be found in the demand graph, and composite component information obtained after conversion of the corresponding demand graph is perfected according to the attribute of each module;
for all modules in the internal module diagram, perfecting the information of the corresponding module in the module definition diagram according to the attribute of each module;
and converting the security configuration into a security accessory of an AADL model.
Optionally, said converting each module into a corresponding composite component of the AADL model according to the attribute of each module includes:
the attributes of each module comprise software attributes and hardware attributes, and the composite component comprises a software component and a hardware component;
and taking the software component corresponding to the software attribute of each module and the hardware component corresponding to the hardware attribute as the composite component of each module.
In this step, for the requirement graph, each requirement can be converted into a set of system components of the composite component in the AADL, each software implementation part in the requirement is converted into a software component in the composite component, and each hardware implementation part is converted into a hardware component in the composite component;
all modules in the module definition graph can be found in the demand graph, and composite component information obtained after conversion of the corresponding demand graph is perfected according to the attribute of each module;
for all modules in the internal module diagram, perfecting the information of the corresponding module in the module definition diagram according to the attribute of each module;
and converting the security configuration into a security accessory of an AADL model.
In the embodiment, the content described by the requirement graph is mapped to a composite component in the architecture model;
mapping system requirements implemented by software to application software components (e.g., processes, threads, thread groups, data, or subroutines);
mapping system requirements implemented by hardware to hardware components (e.g., processors/virtual processors, memory, devices, or buses/virtual buses);
mapping non-functional requirements of the system to attribute assignments of the components;
the relationship between the requirements is mapped to the interaction relationship (such as including, tracking, inheriting, improving, satisfying, verifying) between the components.
Taking the design implementation of an ATM as an example, the existing withdrawal requirement needs to ensure that the balance in the ATM is not less than the withdrawal amount, the account balance is not less than the withdrawal amount, and the withdrawal amount meets the input requirement. The current requirement translates into one system component in the composite component that contains the required software components and hardware components. Wherein the ATM is mapped as a device component A in the hardware components; the comparison between the balance and the withdrawal amount in the ATM is mapped into a process component B which is associated with A in the software components; the withdrawal account is mapped to a process component C in the software component; the comparison of the withdrawal amount and the account balance is mapped to a process component D of C among the software components.
In this embodiment, the AADL architecture design model obtained after conversion needs further refinement, and in the refinement process, if the module is the same as the associated requirement, the corresponding component is complemented and perfected according to the component, value, constraint and the like of the module; if the module is different from the associated requirement, a new component is created according to the content of the module, and meanwhile, the refinement and the perfection are carried out; the relationships between modules are mapped to the interaction relationships (e.g., associations, generalizations, dependencies) between components.
Traversing an internal module diagram of the system, and mapping connectors and item streams between modules into port and stream information between components;
a security accessory that converts a security configuration to AADL.
The architecture description and analysis method provided by the invention and the conversion method from the system requirement model to the architecture model automate the process. Meanwhile, in order to ensure the correctness of the system requirements and the system structure design, the model needs to be verified to confirm whether the system requirements model and the system structure model correctly reflect the requirements of the system such as function, safety, reliability and the like, and if the requirements are not met, corresponding correction is carried out. Therefore, there is a need for a design verification method in the system design process that finds errors as early as possible and corrects them in time to avoid propagating design errors to the next stage.
The method for judging whether the model meets the property exists, but consistency between a design model and a demand model is not verified, because a conversion scheme from the demand model to an architecture model on the basis of safety extension is firstly provided in the application, a consistency verification method is adopted to verify the result of the conversion scheme, and the complexity of the model in the verification process increases the complexity of the verification process, so the method is mainly realized by splitting the model in the modeling process and simplifying the complexity of a single model.
Step 4, carrying out consistency verification on the AADL architecture design model obtained in the step 3 and the system requirement SysML model obtained in the step 2, wherein the consistency verification comprises the following steps:
step 41, constructing a real-time interface automaton according to the AADL architecture design model;
in this embodiment, since the data component in the software component in the AADL model does not involve state change, only the process component, the thread group component, and the subroutine component need to be constructed as the real-time interface automata. Each component in the four types of components can be used as an object, and a corresponding real-time interface automaton is constructed, wherein the behavior attachment and the safety attachment are mapped to state transition conditions in the automaton, and results of the behavior attachment and the safety attachment are mapped to different states of the object;
for the hardware component in the AADL model, only the construction from the equipment component to the real-time interface automaton is considered. And each equipment component is used as an object to construct a corresponding real-time interface automaton, wherein the behavior attachment and the safety attachment are mapped into state transition conditions in the automaton, and results of the behavior attachment and the safety attachment are mapped into different states of the object.
Step 42, obtaining a PPTL formula of the system to be converted according to the system requirement;
for example, checking the account balance is sufficient, a withdrawal operation may be performed.
The corresponding PPTL formula is given:
Figure BDA0001846559660000121
c denotes checking the current balance of the account, e denotes that the account balance is sufficient, and b denotes performing a withdrawal operation.
43, detecting the PPTL formula by using the real-time interface automatic machine, if the detection result is correct, the AADL system structure design model is consistent with the system requirement SysML model, and executing the step 5; otherwise, returning to the step 3.
In the present embodiment, the interface automaton is converted into a corresponding Promela language, where Promela is a process modeling language for the purpose of verifying the logic of the parallel system. The detection process is to use Promela language converted by an interface automaton to verify whether the PPTL formula is correct or not, and the used tool is Spin. Spin is a popular open source software validation tool that can be used for formal validation of multi-threaded software applications. If the fact that whether the ATM withdrawal function can be executed under the condition that the balance in the ATM equipment is insufficient is detected, a corresponding PPTL formula needs to be given, and if the Spin detection result is failure, the fact that the function cannot be executed under the condition that the balance of the ATM equipment is insufficient is indicated.
The accuracy of the AADL architecture design model which can be verified through the consistency in the step 4 is ensured to a certain extent, so that the problem that errors are easily caused in the final code generation from the system requirement SysML model to the AADL architecture design model is solved.
And 5, converting the AADL system structure design model obtained in the step 3 into a structured language code.
In the present embodiment, the structured language code includes code of a structured language such as C language code, Ada language code, and the like.
Preferably, the AADL architecture design model is converted into C language code.
When the code generation method provided by the invention is applied to an embedded system which requires real-time performance and high safety, C language is generally adopted for realization.
Optionally, when the AADL architecture design model is converted into a C language code, mapping a software component in the AADL architecture design model into the C language code.
In this step, the AADL model is converted into a C language code according to the mapping rule from the AADL model to the C language code.
The rule can automatically convert the architecture model described by AADL into C language code, thereby improving the accuracy of code conversion and saving manpower. In the embodiment, the conversion of the security attachment into the C language code is added into the mapping rule of the AADL model to the C language code, which is not possessed by other rules.
Optionally, the mapping rule of the AADL model to the C language code maps the software component in the AADL architecture design model to the C language code, including:
the software components in the AADL architecture design model comprise a system component, a process component, a thread component, a data component and a subprogram component;
mapping system components in the AADL architecture design model into folders, wherein the folders comprise c files and h files;
mapping process components in the AADL architecture design model into a set of a c-file and an h-file, wherein the c-file comprises implementation of data and function declarations, and the h-file comprises declarations of data and functions shared by threads in a process;
the method comprises the steps of mapping thread components in an AADL architecture design model into a group of files, c and h, wherein the files comprise implementation of data and subprograms, and the files comprise statements of data and subprograms in threads and the files after mapping of the processes;
mapping data components in the AADL architecture design model into data types;
and mapping the subprogram components in the AADL architecture design model into the functions in the c files after the threads or the processes are mapped.
In this embodiment, behavioral and security attachments in the AADL architectural design model are also mapped to the delivery of messages and data in C.

Claims (4)

1. A code automatic generation method based on SysML and AADL model of the safe extension, this method is used for changing the system requirement into the structural language code, characterized by that, this method carries on the safe extension to the primitive SysML, obtain the SysML after the safe extension; describing system requirements by using the SysML after the safety expansion, and obtaining a SysML model of the system requirements; converting the system requirements SysML model to an AADL architecture design model; carrying out consistency verification on the AADL system structure design model and the system requirement SysML model; after the verification is passed, converting the AADL system structure design model into a structured language code;
the method comprises the following steps:
step 1, carrying out safety expansion on the original SysML to obtain the SysML after the safety expansion;
the specific process of the safety extension is as follows:
obtaining a plurality of error models by adding a plurality of constraints, mark values and structure types for describing safety in the original SysML, and obtaining the SysML after safety expansion;
step 2, describing system requirements by adopting the SysML after the safety expansion, and obtaining a SysML model of the system requirements;
step 3, converting the system requirement SysML model into an AADL (architecture design model) system structure;
step 4, carrying out consistency verification on the AADL system structure design model obtained in the step 3 and the system requirement SysML model obtained in the step 2;
the consistency verification comprises the following specific processes:
step 41, constructing a real-time interface automaton according to the AADL architecture design model;
step 42, obtaining a PPTL formula required by the system;
43, detecting the PPTL formula by using the real-time interface automatic machine, if the detection result is correct, the AADL system structure design model is consistent with the system requirement SysML model, and executing the step 5; otherwise, returning to the step 3;
and 5, converting the AADL system structure design model obtained in the step 3 into a structured language code.
2. The method as claimed in claim 1, wherein when the system requirement SysML model is converted into the AADL architecture design model in step 3, the security constructors, requirement diagrams, module definition diagrams and internal module diagrams in the system requirement SysML model are converted into the software components, hardware components and composite components of the AADL architecture design model;
the method specifically comprises the following steps:
for all requirements described by the requirement diagram, converting a plurality of requirements with attributes of software implementation into software components of an AADL architecture design model, converting a plurality of requirements with attributes of hardware implementation into hardware components of the AADL architecture design model, and converting a plurality of requirements with attributes of software and hardware cooperation implementation into composite components of the AADL architecture design model;
for all modules of the module definition map, converting each module into a composite component of the AADL architecture design model;
for all modules of the internal block diagram, converting each module into a composite component of the AADL architecture design model;
and converting the security constructor into a security accessory of an AADL architecture design model.
3. The method as claimed in claim 2, wherein the AADL architecture design model obtained in step 3 is converted into C language code in step 5.
4. The method as claimed in claim 3, wherein the AADL architecture design model is converted into C language code, and the software components in the AADL architecture design model are mapped into C language code.
CN201811273773.1A 2018-10-30 2018-10-30 Code generation method based on security extension SysML and AADL models Active CN109634600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811273773.1A CN109634600B (en) 2018-10-30 2018-10-30 Code generation method based on security extension SysML and AADL models

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811273773.1A CN109634600B (en) 2018-10-30 2018-10-30 Code generation method based on security extension SysML and AADL models

Publications (2)

Publication Number Publication Date
CN109634600A CN109634600A (en) 2019-04-16
CN109634600B true CN109634600B (en) 2021-05-04

Family

ID=66066801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811273773.1A Active CN109634600B (en) 2018-10-30 2018-10-30 Code generation method based on security extension SysML and AADL models

Country Status (1)

Country Link
CN (1) CN109634600B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134599B (en) * 2019-05-09 2023-06-23 中国航空工业集团公司西安航空计算技术研究所 System architecture error behavior verification method and device
CN110286902B (en) * 2019-05-31 2021-09-17 南京航空航天大学 SysML security extension and automatic conversion method from SysML security extension to AADL (architecture analysis and design language) fault model
CN113487286B (en) * 2021-07-14 2023-04-07 重庆大宽科技发展有限公司 Safety quality inspection system, method, computer equipment and storage medium
CN114238084B (en) * 2021-11-30 2024-04-12 中国航空综合技术研究所 SysML-based embedded software security analysis method and system
CN114995809B (en) * 2022-07-21 2022-09-30 军事科学院系统工程研究院网络信息研究所 Provable high-security software construction method and system
CN116048518B (en) * 2022-11-14 2023-12-01 南京航空航天大学 Automatic generation method of comprehensive avionics system security codes for antenna operating system
CN115758789B (en) * 2022-12-01 2023-11-17 金航数码科技有限责任公司 Software architecture design and architecture transfer method of complex real-time embedded system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701277A (en) * 2016-01-05 2016-06-22 中国航空无线电电子研究所 AADL modeling based avionics system architecture real-time performance analysis method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9027001B2 (en) * 2012-07-10 2015-05-05 Honeywell International Inc. Systems and methods for verifying expression folding

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701277A (en) * 2016-01-05 2016-06-22 中国航空无线电电子研究所 AADL modeling based avionics system architecture real-time performance analysis method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于SysML & AADL的IMA刹车控制系统实时性需求验证";邓佳佳等;《计算机与现代化》;20171013;第40-49 *

Also Published As

Publication number Publication date
CN109634600A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN109634600B (en) Code generation method based on security extension SysML and AADL models
CN108536445B (en) Highly-automated formal verification system and method for intelligent contract of block chain
Papadopoulos et al. Model-based synthesis of fault trees from matlab-simulink models
CN111062038B (en) Intelligent contract formalization verification system and method based on state space
CN106528100B (en) System and method for model-based techniques and processes for safety-critical software development
Cimatti et al. OCRA: A tool for checking the refinement of temporal contracts
CN108509336B (en) Operating system standard formalization verification and test method
CN110134599B (en) System architecture error behavior verification method and device
CN109739740A (en) A kind of AADL model combination formalization verification method
CN112416337A (en) Software architecture development system for aerospace embedded system
CN103365774A (en) Transient error detection method based on function call relationship
CN113282492A (en) Operating system kernel formal verification method
Ratiu et al. FASTEN: an extensible platform to experiment with rigorous modeling of safety-critical systems
CN111679964B (en) Formal verification method of microkernel operating system interface based on boundary model detection technology
CN115687166B (en) Formal verification method and system
CN110287089B (en) Microkernel IPC (inter-processor communication protocol) verification method based on intermediate format and SMT (surface mount technology)
Elmqvist et al. Safety-oriented design of component assemblies using safety interfaces
JP2008305079A (en) Requirement specification automatic verification method
CN112559359B (en) S-based 2 ML security critical system analysis and verification method
CN115687165B (en) Demand layer form verification method and system
Stürmer et al. Modeling Guidelines and Model Analysis Tools in Embedded Automotive Software Development.
KR101585926B1 (en) Apparatus and method for automation of test generation for operating system
CN115687167B (en) Formal verification method and device for group intelligent operating system
CN114756217B (en) Plug-in based script generation system
US20230072988A1 (en) System and a method for automatic generation of smart contracts across blockchain platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant