140 likes | 309 Views
Dependable Technologies Verification & Validation. ( DeFINE) Ana CAVALLI INT- Evry France. MOTIVATION. Why verification and validation are crucial dependable technologies ? Dependability has as main objectives: availability, reliability, survivability, safety, security...
E N D
Dependable TechnologiesVerification & Validation (DeFINE) Ana CAVALLI INT- Evry France
MOTIVATION • Why verification and validation are crucial dependable technologies ? • Dependability has as main objectives: availability, reliability, survivability, safety, security... • To achieve these objectives it is necessary to use methods for • System design • Verification • Validation (testing)
VERIFICATION & VALIDATION • What is verification? • Verification: To check that the system specification is correct and does not contain errors • What is validation? • Validation (testing): To check that the system implementation possesses the expected properties and does not contains errors (also to check interoperability with other implementations or other components)
VERIFICATION • Based on • formal specifications • static analysis techniques • model checking • To verify • global properties • component properties • To detect • design errors • deadlocks, livelocks
VALIDATION (testing) • Based on • formal specifications • active testing techniques (test generation, test selection, test execution) • passive (monitoring) testing techniques • definition of new architectures (for instance to test embedded systems) • fault models definition (to help define coverage and to detect errors) • coverage measures • To perform • component testing • integration testing • interoperability testing • load testing • robustness testing • To detect • functional errors • structural errors • transmission errors
HUMAN FACTOR IN SOFTWARE DESIGN • Combining both verification and validation techniques to be applied on system human interaction • to anticipate user behaviour (automation surprises, particularly in critical situations) • to specify stress environments • to produce scenarios that may identify potential automation surprises
GOALS • Adaptation of these techniques to dependable embedded systems. For instance, to be applied to: • fault tolerant architectures • cryptography, security protocols • real time constraints • Use of software tools • for the application to real systems • to assure scalability of methods • Integration in platforms to cover verification and validation (testing) of dependable systems
APPLICATION DOMAINS • Telecommunication systems • Cellular and wireless networks • Communication protocols • Ad-hoc services and networks • Rescue, emergency, military, ... • Embedded systems • Transportation systems (air and ground) • Smart highways, automatic driving devices • Devices for helping handicapped persons
WORKING GROUPS • WG1:Verification and validation methodologies for dependable embedded systems • WG2: New validation architectures for dependable embedded systems • WG3:Monitoring dependability measures • WG5: Formal aspects of user behaviour in safety critical environments. • WG6: Platforms for verification and validation of dependable industrial applications (cellular and wireless networks, ground and air transportation).
CROSS ACTIONS • Roadmap for verification and validation of dependable embedded systems: A strategy for research and development • Education and training: Creation of Pan-European masters as well as a common Doctoral program • Elaborate best practices • Participation in the definition of standards: ETSI, ISO, ITU-T, OMG, IETF, etc. • Promotion of common activities with enterprises: IP projects, national projects
PARTNERS • Main partners: • GET-INT (Institut National des Télécom.) - Ana Cavalli • University of Bordeaux I - CNRS-LABRI - Richard Castanet • University of Nijmegen - Jan Tretmans • Main associated non European partner • University of Québec at Montréal - Abdel Obaid
ASSOCIATED PARTNERS • Academic institutions: • University of Evry - CNRS-LAMI. Pascale Legall • Univ. J. Fourier, INPG Grenoble - CNRS-LSR/IMAG. Farid Ouabdesselam • LAAS-ENSICA – Toulouse. Pierre de Saqui-Sannes • ETSI - Anthony Wiles • Brandenburg University of Technology, Cottbus. Hartmut König • GMD FOKUS Fraunhofer Gesellschaft, Berlin. Ina Schieferdecker • Humboldt University Berlin and Fraunhofer FIRST. Holger Schlingloff • University of Goettingen - Dieter Hogrefe, • University of Bremen. Jan Bredereke • University of Stirling. Ken Turner • CNR-IEI, Pisa. Antonia Bertolino, • Universidad Carlos III, Madrid. Carlos Delgado Kloos • Universidad Complutense de Madrid. Manuel Núñez • Tomsk University. Nina Yetvushenko
ASSOCIATED PARTNERS • Industrial partners: • Siemens. Andreas Ulrich • Airbus Deutschland, Hamburg. Hans-Joachim Tews • Verified Systems International GmbH. Jan Peleska • Testing Technologies IST GmbH. Theofanis Vassiliou-Gioles • Praxis Critical Systems. Keith Harrison • Ericsson Lab Italy-Rome. Emilia Peciola • Teleca France. Edgardo Montes de Oca • Ericsson Hungary Ltd. Conformance Lab. Sarolta Dibuz • Fiat Research Center (CRF). Guido Scarafiotti • Inquas Srl. Daniele Pes • Telefonica I+D. Pedro Lizcano • NOKIA. Colin Willcock • POLKOMTEL. Joanna Lecornu • Israel Aircraft Industries (IAI). Avner Engel