The infeasibility of experimental quantification of life-critical software reliability
SIGSOFT '91 Proceedings of the conference on Software for citical systems
An improved inspection technique
Communications of the ACM
Validation of ultrahigh dependability for software-based systems
Communications of the ACM
A Practical Tutorial on Modified Condition/Decision Coverage
A Practical Tutorial on Modified Condition/Decision Coverage
Clear requirements: improving validity using cognitive linguistic elicitation and representation
Clear requirements: improving validity using cognitive linguistic elicitation and representation
Limits to Dependability Assurance--A Controversy Revisited
ICSE COMPANION '07 Companion to the proceedings of the 29th International Conference on Software Engineering
Formal Verification of Floating-Point Programs
ARITH '07 Proceedings of the 18th IEEE Symposium on Computer Arithmetic
Specifying Software Requirements for Complex Systems: New Techniques and Their Application
IEEE Transactions on Software Engineering
Formal Verification by Reverse Synthesis
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Journal of Automated Reasoning
seL4: formal verification of an OS kernel
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Formal pervasive verification of a paging mechanism
TACAS'08/ETAPS'08 Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems
Software Process Synthesis in Assurance Based Development of Dependable Systems
EDCC '10 Proceedings of the 2010 European Dependable Computing Conference
Assessing software interference management when modifying safety-related software
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in which every aspect of software dependability can be demonstrated with high confidence. In this paper, we present the results of a case study exploration of the practical limitations on software dependability. We analyze a software assurance argument for weaknesses and extrapolate a set of limitations including dependence upon correct requirements, dependence upon reliable human-to-human communication, dependence upon human compliance with protocols, dependence upon unqualified tools, the difficulty of verifying low-level code, and the limitations of testing. We discuss each limitation’s impact on our specimen system and potential mitigations.