Skip to main content

Software Criticality Analysis of COTS/SOUP

  • Conference paper
  • First Online:
Book cover Computer Safety, Reliability and Security (SAFECOMP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2434))

Included in the following conference series:

Abstract

This paper describes the Software Criticality Analysis (SCA) approach that was developed to support the justification of commercial off-the-shelf software (COTS) used in a safety-related system. The primary objective of SCA is to assess the importance to safety of the software components within the COTS and to show there is segregation between software components with different safety importance. The approach taken was a combination of Hazops based on design documents and on a detailed analysis of the actual code (100kloc). Considerable effort was spent on validation and ensuring the conservative nature of the results. The results from reverse engineering from the code showed that results based only on architecture and design documents would have been misleading.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. PG Bishop, RE Bloomfield, Tim Clement, Sofia Guerra and Claire Jones. Static Analysis of COTS Used in Safety Application. Adelard document D198/4308/2, 2001.

    Google Scholar 

  2. PG Bishop, RE Bloomfield and PKD Froome. Justifying the use of software of uncertain pedigree (SOUP) in safety-related applications. Report No: CRR336 HSE Books 2001 ISBN 0 7176 2010 7, http://www.hse.gov.uk/research/crr_pdf/2001/crr01336.pdf.

  3. Interim Defence Standard 00-58, Hazop studies on Systems Containing Programmable Electronics. Part 1: Requirements. Part 2: General Application Guidance. Issue 2 MoD 2000.

    Google Scholar 

  4. D J Burns, R M Pitblado, A Modified Hazop Methodology for Safety Critical System Assessment, in Directions in Safety-critical Systems, Felix Redmill and Tom Anderson (eds), Springer Verlag, 1993.

    Google Scholar 

  5. PolySpace Technologies, http://www.polyspace.com.

  6. F. Tip, “A Survey of Program Slicing Techniques”, Journal of Programming Languages, Vol.3,No.3, pp.121–189, September, 1995. http://citeseer.nj.nec.com/tip95survey.html.

    Google Scholar 

  7. T Cichocki and J Gorski, Formal support for fault modelling and analysis, in U Voges (ed): SAFECOMP 2001, LNCS 2187, pp 202–211, Springer-Verlag, 2001.

    Google Scholar 

  8. Rainer Faller, Project Experience with IEC 61508 and Its Consequences, in U Voges (ed): SAFECOMP 2001, LNCS 2187, pp 212–226, Springer-Verlag, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bishop, P., Bloomfield, R., Clement, T., Guerra, S. (2002). Software Criticality Analysis of COTS/SOUP. In: Anderson, S., Felici, M., Bologna, S. (eds) Computer Safety, Reliability and Security. SAFECOMP 2002. Lecture Notes in Computer Science, vol 2434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45732-1_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-45732-1_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44157-1

  • Online ISBN: 978-3-540-45732-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics