SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
15 March, 2017
Juha-Pekka Tolvanen
jpt@metacase.com
Automating Safety Engineering
with Model-Based Techniques
Agenda
 Motivation
 A model-based approach
 Examples
 Demonstration
 Q&A
Motivation
 Safety engineering is quite expensive and tedious
– Requires considerable about of manual work
– Scales badly to larger systems
 Feedback to system and software design could be
improved
– Safety engineering flows do not always acknowledge
typical iterative/incremental development approach
* Copyright: Donald M. Mattox, Management Plus, Inc.
*
Model-based approach supports
safety design by:
1. Utilizing existing specifications with model
transformations
– Safety design must be related to what is developed (or
planned to be developed – also at early stages)
– Usually such nominal specifications already exists
2. Applying directly safety concepts in models
– Safety standards suggest already now own terminology
3. Linking safety related models to analytical tools
– Use models created (automatically) with various analysis
tools
– Different tools for different purposes
1) Utilize existing specifications
 Usually some designs or specifications already exist,
e.g. logical functions, hardware specification, behavior…
 Translate those models for safety (sample next slide)
1) Utilizing existing specifications
Model transformation
in MetaEdit+ tool
1) Error logic – partly generated
 Analyze error propagation directly in a model
ISO 26262 from 10.000 feet
 Define the item (functions) and preliminary architecture
 Determine how the item can fail (HAZOP or FMEA)
 Determine the driving scenarios that make the failures
hazardous
 Determine the exposure (E) to the hazard based on
the driving scenario
 Evaluate the severity (S) of the hazard
 Evaluate the controllability (C) by the operator
 Calculate the ASIL
 Verify your E and C assumptions
ISO 13849-1 from 10.000 feet
 Define the scope (usage, environment etc)
 Identify risk sources
 Estimate the risk
 Evaluate the risk
 Identify safety functions
 Calculate risks
 Use the results to reduce risks
2) Apply safety concepts directly
while modeling
 ISO26262
– Item
– Hazard
– HazardEvent
– SafetyGoal
– Requirement
– SafetyConcept
– …
Contains the
generated ErrorModel
Exports the error model
to HipHOPS tool
3) Link with analytical tools
Produced FTA
FMEA results
Scaled for larger systems
 FTA/FMEA with cut sets, unavailability,
costs, failure rates, repair rates
3) Different analytical tools
 Same model-based approach with another analysis tool
 Specification language adapted for specific needs
3) Link to another analysis tool
Produced
project data
Exports the model
to Sistema tool
Summary
 Use of model-based approach provides several benefits:
– Ensures that safety analysis is done for the
intended/designed architecture
– Makes safety analysis faster as it is partly automated
– Reduces error-prone routine work
– Makes safety analysis easier to use and accessible
 The presented approach is not tied to any particular tool
 Specification languages and related transformations
need to be flexible
 Extend the approach by providing feedback loop back
from analysis to original source models
Thank you!
Questions, please?
For references on examples and cases contact:
Juha-Pekka Tolvanen, jpt@metacase.com
www.metacase.com

Weitere ähnliche Inhalte

Was ist angesagt?

Rocca Fellow Pedroni
Rocca Fellow PedroniRocca Fellow Pedroni
Rocca Fellow Pedroni
Rocca Fellows
 
Enszer Physical Principle Demo Nd
Enszer Physical Principle Demo NdEnszer Physical Principle Demo Nd
Enszer Physical Principle Demo Nd
Intro Engineering
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
owenchambers11
 

Was ist angesagt? (13)

Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
 
Exam – june 2010 – qp 11
Exam – june 2010 – qp 11Exam – june 2010 – qp 11
Exam – june 2010 – qp 11
 
Rocca Fellow Pedroni
Rocca Fellow PedroniRocca Fellow Pedroni
Rocca Fellow Pedroni
 
Enszer Physical Principle Demo Nd
Enszer Physical Principle Demo NdEnszer Physical Principle Demo Nd
Enszer Physical Principle Demo Nd
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
NUMERICAL METHOD AND ITS APPLICATION
NUMERICAL METHOD AND ITS APPLICATIONNUMERICAL METHOD AND ITS APPLICATION
NUMERICAL METHOD AND ITS APPLICATION
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
 
Risk Assessment
Risk Assessment Risk Assessment
Risk Assessment
 
Critis08 Q Ra
Critis08 Q RaCritis08 Q Ra
Critis08 Q Ra
 
Real-time Ranking of Electrical Feeders using Expert Advice
Real-time Ranking of Electrical Feeders using Expert AdviceReal-time Ranking of Electrical Feeders using Expert Advice
Real-time Ranking of Electrical Feeders using Expert Advice
 
Real-time ranking with concept drift using expert advice
Real-time ranking with concept drift using expert adviceReal-time ranking with concept drift using expert advice
Real-time ranking with concept drift using expert advice
 

Andere mochten auch

Andere mochten auch (16)

EU Funding Guide
EU Funding GuideEU Funding Guide
EU Funding Guide
 
An Introduction to boilerPRO
An Introduction to boilerPROAn Introduction to boilerPRO
An Introduction to boilerPRO
 
Unlocking your Creativity: Taking your ideas beyond
Unlocking your Creativity: Taking your ideas beyondUnlocking your Creativity: Taking your ideas beyond
Unlocking your Creativity: Taking your ideas beyond
 
Five Slides on Creativity and Innovation
Five Slides on Creativity and InnovationFive Slides on Creativity and Innovation
Five Slides on Creativity and Innovation
 
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
 
mBot workshop
mBot workshopmBot workshop
mBot workshop
 
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
 
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri HakanenAsiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
 
Workplace Bullying Quotes
Workplace Bullying QuotesWorkplace Bullying Quotes
Workplace Bullying Quotes
 
ディープラーニングハンズオンを準備して学んだこと
ディープラーニングハンズオンを準備して学んだことディープラーニングハンズオンを準備して学んだこと
ディープラーニングハンズオンを準備して学んだこと
 
アルゴリズムのイメージを擬人化する
アルゴリズムのイメージを擬人化するアルゴリズムのイメージを擬人化する
アルゴリズムのイメージを擬人化する
 
Michel Foucault, poder saber y constitucion sujeto moderno
Michel Foucault, poder saber y constitucion sujeto modernoMichel Foucault, poder saber y constitucion sujeto moderno
Michel Foucault, poder saber y constitucion sujeto moderno
 
Distribution and ex dividend dates-upto 17 mar-2017
Distribution and ex dividend dates-upto 17 mar-2017Distribution and ex dividend dates-upto 17 mar-2017
Distribution and ex dividend dates-upto 17 mar-2017
 
Six Trumps: Six Learning Principles that Trump Traditional Teaching
Six Trumps: Six Learning Principles that Trump Traditional TeachingSix Trumps: Six Learning Principles that Trump Traditional Teaching
Six Trumps: Six Learning Principles that Trump Traditional Teaching
 
エターナらないゲーム開発
エターナらないゲーム開発エターナらないゲーム開発
エターナらないゲーム開発
 
Violencia Virtual
Violencia VirtualViolencia Virtual
Violencia Virtual
 

Ähnlich wie Automating safety engineering with model based techniques

Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
githe26200
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
Marco Morana
 
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
powerofgametest
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
Xiao Qin
 

Ähnlich wie Automating safety engineering with model based techniques (20)

Asim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defenseAsim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defense
 
Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
 
Trends in Embedded Software Engineering
Trends in Embedded Software EngineeringTrends in Embedded Software Engineering
Trends in Embedded Software Engineering
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
Lecture5
Lecture5Lecture5
Lecture5
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
 
20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma
 
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Sanjay
SanjaySanjay
Sanjay
 

Mehr von Juha-Pekka Tolvanen

Mehr von Juha-Pekka Tolvanen (13)

What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
How to formalize a ubiquitous language into a domain-specific language.pdf
How to formalize a ubiquitous language into a domain-specific language.pdfHow to formalize a ubiquitous language into a domain-specific language.pdf
How to formalize a ubiquitous language into a domain-specific language.pdf
 
Measuring Productivity from Model-Based Development
Measuring Productivity from Model-Based DevelopmentMeasuring Productivity from Model-Based Development
Measuring Productivity from Model-Based Development
 
How domain specific modeling languages address variability: investigation of ...
How domain specific modeling languages address variability: investigation of ...How domain specific modeling languages address variability: investigation of ...
How domain specific modeling languages address variability: investigation of ...
 
Effort Used to Create Domain-Specific Modeling Languages
Effort Used to Create Domain-Specific Modeling LanguagesEffort Used to Create Domain-Specific Modeling Languages
Effort Used to Create Domain-Specific Modeling Languages
 
Collaborative language engineering and language use: demo with MetaEdit+
Collaborative language engineering and language use: demo with MetaEdit+Collaborative language engineering and language use: demo with MetaEdit+
Collaborative language engineering and language use: demo with MetaEdit+
 
Automotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL modelsAutomotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL models
 
Collaborative modeling and metamodeling
Collaborative modeling and metamodelingCollaborative modeling and metamodeling
Collaborative modeling and metamodeling
 
Collaborative modeling and metamodeling in MetaEdit+
Collaborative modeling and metamodeling in MetaEdit+Collaborative modeling and metamodeling in MetaEdit+
Collaborative modeling and metamodeling in MetaEdit+
 
20 examples on Domain-Specific Modeling Languages
20 examples on Domain-Specific Modeling Languages20 examples on Domain-Specific Modeling Languages
20 examples on Domain-Specific Modeling Languages
 
Model level debugging and profiling, Code Generation Conference 2014
Model level debugging and profiling, Code Generation Conference 2014Model level debugging and profiling, Code Generation Conference 2014
Model level debugging and profiling, Code Generation Conference 2014
 
Keynote at Code Generation 2014: The business cases of modeling and generators
Keynote at Code Generation 2014: The business cases of modeling and generatorsKeynote at Code Generation 2014: The business cases of modeling and generators
Keynote at Code Generation 2014: The business cases of modeling and generators
 
Industrial experiences on Domain-Specific Modeling
Industrial experiences on Domain-Specific ModelingIndustrial experiences on Domain-Specific Modeling
Industrial experiences on Domain-Specific Modeling
 

Kürzlich hochgeladen

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 

Kürzlich hochgeladen (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

Automating safety engineering with model based techniques

  • 1. 15 March, 2017 Juha-Pekka Tolvanen jpt@metacase.com Automating Safety Engineering with Model-Based Techniques
  • 2. Agenda  Motivation  A model-based approach  Examples  Demonstration  Q&A
  • 3. Motivation  Safety engineering is quite expensive and tedious – Requires considerable about of manual work – Scales badly to larger systems  Feedback to system and software design could be improved – Safety engineering flows do not always acknowledge typical iterative/incremental development approach * Copyright: Donald M. Mattox, Management Plus, Inc. *
  • 4. Model-based approach supports safety design by: 1. Utilizing existing specifications with model transformations – Safety design must be related to what is developed (or planned to be developed – also at early stages) – Usually such nominal specifications already exists 2. Applying directly safety concepts in models – Safety standards suggest already now own terminology 3. Linking safety related models to analytical tools – Use models created (automatically) with various analysis tools – Different tools for different purposes
  • 5. 1) Utilize existing specifications  Usually some designs or specifications already exist, e.g. logical functions, hardware specification, behavior…  Translate those models for safety (sample next slide)
  • 6. 1) Utilizing existing specifications Model transformation in MetaEdit+ tool
  • 7. 1) Error logic – partly generated  Analyze error propagation directly in a model
  • 8. ISO 26262 from 10.000 feet  Define the item (functions) and preliminary architecture  Determine how the item can fail (HAZOP or FMEA)  Determine the driving scenarios that make the failures hazardous  Determine the exposure (E) to the hazard based on the driving scenario  Evaluate the severity (S) of the hazard  Evaluate the controllability (C) by the operator  Calculate the ASIL  Verify your E and C assumptions
  • 9. ISO 13849-1 from 10.000 feet  Define the scope (usage, environment etc)  Identify risk sources  Estimate the risk  Evaluate the risk  Identify safety functions  Calculate risks  Use the results to reduce risks
  • 10. 2) Apply safety concepts directly while modeling  ISO26262 – Item – Hazard – HazardEvent – SafetyGoal – Requirement – SafetyConcept – … Contains the generated ErrorModel
  • 11. Exports the error model to HipHOPS tool 3) Link with analytical tools Produced FTA FMEA results
  • 12. Scaled for larger systems  FTA/FMEA with cut sets, unavailability, costs, failure rates, repair rates
  • 13. 3) Different analytical tools  Same model-based approach with another analysis tool  Specification language adapted for specific needs
  • 14. 3) Link to another analysis tool Produced project data Exports the model to Sistema tool
  • 15. Summary  Use of model-based approach provides several benefits: – Ensures that safety analysis is done for the intended/designed architecture – Makes safety analysis faster as it is partly automated – Reduces error-prone routine work – Makes safety analysis easier to use and accessible  The presented approach is not tied to any particular tool  Specification languages and related transformations need to be flexible  Extend the approach by providing feedback loop back from analysis to original source models
  • 16. Thank you! Questions, please? For references on examples and cases contact: Juha-Pekka Tolvanen, jpt@metacase.com www.metacase.com