Skip to main content

Static Analysis Techniques to Verify Mutual Exclusion Situations within SysML Models

  • Conference paper
SDL 2013: Model-Driven Dependability Engineering (SDL 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7916))

Included in the following conference series:

Abstract

AVATAR is a real-time extension of SysML supported by the TTool open-source toolkit. So far, formal verification of AVATAR models has relied on reachability techniques that face a state explosion problem. The paper explores a new avenue: applying structural analysis to AVATAR models, so as to identify mutual exclusion situations. In practice, TTool translates a subset of an AVATAR model into a Petri net and solves an equation system built upon the incidence matrix of the net. TTool implements a push-button approach and displays verification results at the AVATAR model level. The approach is not restricted to AVATAR and may be adapted to other UML profiles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Debbabi, M., Hassaïne, F., Jarraya, Y., Soeanu, A., Alawneh, L.: Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models, p. 270. Springer (2010) ISBN 978-3-642-15227-6

    Google Scholar 

  2. Atego ARTiSAN Studio, http://www.atego.com/products/artisan-studio/

  3. SysML Companion, http://www.realtimeatwork.com/software/sysml-companion/

  4. Dragomir, I., Ober, I., Lesens, D.: A Case Study in Formal System Engineering with SysML. In: 17th International Conference on Engineering of Complex Computer Systems (ICECCS 2012), pp. 189–198. IEEE Computer Society (2012)

    Google Scholar 

  5. TOPCASED, http://www.topcased.org

  6. TTool, http://ttool.telecom-paristech.fr

  7. Knorreck, D., Apvrille, L., De Saqui-Sannes, P.: TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification. ACM SIGSOFT Software Engineering Notes 36(1), 1–8 (2012)

    Article  Google Scholar 

  8. Pedroza, G., Knorreck, D., Apvrille, L.: AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties. In: New Technologies of Distributed Systems (NOTERE), pp. 1–10. IEEE (2011), http://dx.doi.org/10.1109/NOTERE.2011.5957992

  9. Apvrille, L., Becoulet, A.: Prototyping an Embedded Automotive System from its UML/SysML Models. In: Proceedings of Embedded Real Time Systems and Software (ERTSS 2012) (2012), www.erts2012.org/Site/0P2RUC89/3C-1.pdf

  10. Bengtsson, J., Yi, W.: Timed Automata: Semantics, Algorithms and Tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 87–124. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Blanchet, B.: Using Horn Clauses for Analyzing Security Protocols. In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol. 5, pp. 86–111. IOS Press (2011)

    Google Scholar 

  12. Murata, T.: Petri Nets: Properties, Analysis and Applications. Proceedings of the IEEE 77(4), 541–580 (1989)

    Article  Google Scholar 

  13. Diaz, M.: Modeling and analysis of communication and cooperation protocols using petri net based models. Computer Networks 6(6), 419–441 (1982)

    MATH  Google Scholar 

  14. Diaz, M.: Petri Nets: Fundamental Models, Verification and Applications, p. 768. John Wiley & Sons (2009)

    Google Scholar 

  15. Farkas, J.: Theorie den einfachen Ungleichungen. Journal für die Reine und Angewandte Mathematik (Crelle’s Journal) 124, 1–27 (1902)

    Google Scholar 

  16. Colom, J.-M., Silva, M.: Improving the Linearly Based Characterization of P/T Nets. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 113–145. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  17. Kelling, E., Friedewald, M., Leimbach, T., Menzel, M., Séger, P., Seudié, H., Weyl, B.: Specification and evaluation of e-security relevant use cases. Technical Report Deliverable D2.1, EVITA Project (2009)

    Google Scholar 

  18. Object Management Group: OMG Systems Modeling Language (OMG SysMLTM) Version 1.3, http://www.omg.org/spec/SysML/1.3/PDF/

  19. Object Management Group: Documents Associated With Unified Modeling Language (UML), V2.4.1, http://www.omg.org/spec/UML/2.4.1/

  20. Ober, I., Ober, I., Dragomir, I., Aboussoror, E.A.: UML/SysML semantic tunings. Innovations in Systems and Software Engineering 7(4), 257–264 (2011)

    Article  Google Scholar 

  21. da Silva, E.C., Villani, E.: Integrando sysml e model checking para v&v de software critico espacial. In: Brasilian Symposium on Aerospace Engineering and Applications (2009), http://www.cta-dlr2009.ita.br/Proceedings/PDF/59054.pdf

  22. Ayache, J.-M., Courtiat, J.-P., Diaz, M.: REBUS, A Fault-Tolerant Distributed System for Industrial Real-Time Control. IEEE Transactions on Computers 31(7), 637–647 (1982)

    Article  Google Scholar 

  23. Time Petri Net Analyzer, http://projects.laas.fr/tina/

  24. Jensen, K.: Coloured Petri Nets and the Invariant Method. Theoretical Computer Science 14(3), 317–336 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Apvrille, L., de Saqui-Sannes, P. (2013). Static Analysis Techniques to Verify Mutual Exclusion Situations within SysML Models. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds) SDL 2013: Model-Driven Dependability Engineering. SDL 2013. Lecture Notes in Computer Science, vol 7916. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38911-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38911-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38910-8

  • Online ISBN: 978-3-642-38911-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics