Skip to main content

Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4680))

Abstract

A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design description are represented by function blocks (FBs). The SSA, as a part of the verification and validation activities, was activated at each phase of the software lifecycle. For the SSA of the FB modules, the software HAZOP was performed and then the SFTA (Software Fault Tree Analysis) was applied. Both methods are redundant and complementary because the software HAZOP is a forward broad-thinking analysis method and the SFTA is a backward step-by-step local analysis method. The software HAZOP with qualitative properties for a deviation evaluated all the software modules and identified various hazards. The SFTA with well-defined FB fault tree templates was applied to some critical modules selected from the software HAZOP analysis and it identified some hazards that had not been identified in the prior processes of the document evaluation and the formal verification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Park, J.H., Lee, D.Y., Kim, C.H.: Development of KNICS RPS Prototype. In: Proceedings of ISOFIC (International Symposium on the Future I&C for NPPs) 2005, Session 6, Tongyeong, Korea, pp. 160–161 (2005)

    Google Scholar 

  2. Koo, S.R., Seong, P.H., Yoo, J., Cha, S.D., Youn, C., Han, H.-C.: NuSEE: An Integrated Environment of Software Specification and V&V for PLC based Safety-Critical Systems. Nuclear Engineering and Technology 38, 259–276 (2006)

    Google Scholar 

  3. Kwon, K.C., Lee, J.S., Cheon, S.W.: Software Qualification Strategy for the Digital Protection Safety Systems in KNICS. In: American Nuclear Society Winter Meeting, Albuquerque, NM, USA, November 12–16, 2006, pp. 109–110 (2006)

    Google Scholar 

  4. IEC 61131, Part 3, International Standard for Programmable Logic Controllers: Programming Languages, International Electrotechnical Commission (1993)

    Google Scholar 

  5. Regulatory Guide 1.168, Verification, Validation, Reviews and Audits for Digital Computer Software Used in Safety Systems of Nuclear Power Plants, U.S. Nuclear Regulatory Commission (2004)

    Google Scholar 

  6. IEEE Std-1228, Software Safety Plan (1994)

    Google Scholar 

  7. Lawrence, J.D.: Software Safety Hazard Analysis, UCRL-ID-122514, Lawrence Livermore National Laboratory (1995)

    Google Scholar 

  8. Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley Inc., Reading (1995)

    Google Scholar 

  9. Lee, J.S., Lindner, A., Choi, J.G., Miedl, H., Kwon, K.C.: Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 85–98. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Redmill, F., Chudleigh, M.F., Catmur, J.R.: Principles underlying a Guideline for Applying HAZOP to Programmable Electronic Systems. Reliability Engineering and System Safety 55, 283–293 (1997)

    Article  Google Scholar 

  11. McDermid, J.A., Pumfrey, D.J.: A Development of HAZARD Analysis to Aid Software Design. In: Proceedings of the 9th Annual Conference on Computer Assurance, Gaithersburg, MD, USA, pp. 17–25 (1994)

    Google Scholar 

  12. NUREG-0800, Standard Review Plan: BTP HICB–14, Guidance on Software Reviews for Digital Computer-Based Instrumentation and Control Systems, U.S. Nuclear Regulatory Commission (1997)

    Google Scholar 

  13. Lee, J.S., et al.: HAZOP Method for Safety Analysis of Software Requirements Specification (in Korean). In: Proceedings of the Korean Nuclear Society Spring Meeting, Gyeongju, Korea, May 2003, vol. 87 (2003)

    Google Scholar 

  14. Leveson, N.G., Shimeall, T.J.: Safety Verification of Ada Programs using Software Fault Trees. IEEE Software, 48–59 (1991)

    Google Scholar 

  15. Cha, S.S., Leveson, N.G., Shimeall, T.J.: Safety Verification in MURPHY using Fault Tree Analysis. In: Proceedings of 10th International Conference on Software Engineering, Singapore, April 1988, pp. 377–386 (1988)

    Google Scholar 

  16. Oh, Y., Yoo, J., Cha, S., Son, H.S.: Software Safety Analysis of Function Block Diagrams using Fault Trees. Reliability Engineering and System Safety 88, 215–228 (2005)

    Article  Google Scholar 

  17. Jeon, S.: Verification of Function Block Diagram through Verilog Translation, M.S. Thesis, Computer System Division, EECS Department, Korea Advanced Institute of Science and Technology, Korea (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Francesca Saglietti Norbert Oster

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, GY., Lee, JS., Cheon, SW., Kwon, KC., Jee, E., Koh, K.Y. (2007). Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System. In: Saglietti, F., Oster, N. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2007. Lecture Notes in Computer Science, vol 4680. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75101-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75101-4_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75100-7

  • Online ISBN: 978-3-540-75101-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics