Looking at code with your safety goggles on

  • Ken Wong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1411)


This paper presents a process for the refinement of safety-critical source code into a more tractable representation. For large software-intensive information systems, the safety engineering view of the system reveals a “long thin slice” of hazard-related software involving a number of different software components. The hazard-related software is documented in the system “safety verification case” which provides a rigorous argument for the safety of the source code. The refinement process creates a representation of the source code which isolates the relevant source code details. A hypothetical chemical factory information system is examined to illustrate aspects of this process and its significance.


Source Code Software Architecture Thin Slice Fault Tree Analysis Fault Tree Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    John Barnes, “High Integrity Ada The SPARK Examiner Approach”, Addison Wesley Longman Ltd, 1997.Google Scholar
  2. 2.
    Gregory T. Daich, Gordon Price, Bryce Raglund, Mark Dawood, “Software Test Technologies Report”, Test and Reengineering Tool Evaluation Project, Software Technology Support Center, August 1994.Google Scholar
  3. 3.
    Bruce Elliott and Jim Ronback, “A System Engineering Process For Software-Intensive Real-Time Information Systems, in Proceedings of the 14th International System Safety Conference, Albuquerque, New Mexico, August 1996.Google Scholar
  4. 4.
    Tommy Hoffner, “Evaluation and comparison of program slicing tools. Technical Report”, LiTH-IDA-R-95-01, Department of Computer and Information Science, Linkping University, Sweden, 1995.Google Scholar
  5. 5.
    Laura M. Ippolito and Dolores Wallace, “A Study on Hazard Analysis in High Integrity Software Standards and Guidelines”, NISTIR 5589, National Institute of Standards and Technology, January 1995.Google Scholar
  6. 6.
    International Electrotechnical Commission, Draft International Standard IEC 1508: Functional Safety: Safety Related Systems, Geneva, 1995.Google Scholar
  7. 7.
    Philippe B. Krutchen, “The 4+1 View Model of Architecure”, IEEE Software, November 1995.Google Scholar
  8. 8.
    Danny B. Lange and Yuichi Nakamura, “Object-Oriented Program Tracing and Visualization”, IEEE Computer, pp 63–70, May 1997.Google Scholar
  9. 9.
    Nancy G. Leveson, “Safeware: System Safety and Computers”, Addison-Wesley, 1995.Google Scholar
  10. 10.
    Nancy G. Leveson, Steven S. Cha, and Timothy J. Shimall, “Safety Verification of Ada Programs using software fault trees”, IEEE Software, 8(7), pp 48–59, July 1991.CrossRefGoogle Scholar
  11. 11.
    “Slicer Tools List”, Software Technology Support Center, October 1997.Google Scholar
  12. 12.
    Christopher J. Thompson and Vincent Celier. “DVM: An Object-Oriented Framework for Building Large Distributed Ada Systems”, Proceedings of the TRI-Ada '95 Conference, ACM, Anaheim, November 6–10, 1995.Google Scholar
  13. 13.
    Jeanette M. Wing, “A Specifier's Introduction to Formal Methods”, IEEE Computer, 23(9), pp. 8–22, September 1990.Google Scholar
  14. 14.
    Ken Wong, M.Sc. Thesis, Department of Computer Science, University of British Columbia, 1997.Google Scholar
  15. 15. Scholar
  16. 16.
    Peter G. Bishop and Robin E. Bloomfield, “A Methodology for Safety Case Development”, in Safety-critical Systems Symposium, Birmingham, UK, February 1998.Google Scholar
  17. 17.
    P. Fenelon, J.A. McDermid, et al., “Towards Integrated Safety Analysis and Design”, ACM Computing Reviews, 2(1), p. 21–32, 1994.Google Scholar
  18. 18.
    Robyn R. Lutz and Robert M. Woodhouse, “Experience Report: Contributions of SFMEA to Requirements Analysis”, in Proceedings of ICRE'96,1996.Google Scholar
  19. 19.
    Francesmary Modugno, Nancy G. Leveson, Jon D. Reese, Kurt Partridge, and Sean D. Sandys, “Integrated Safety Analysis of Requirements Specifications”, in Proceedings of the 3rd International Symposium on Requirements Engineering, Annapolis, Maryland, January 1997.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Ken Wong
    • 1
  1. 1.Department of Computer ScienceUniversity of British ColumbiaVancouverCanada

Personalised recommendations