SlideShare a Scribd company logo
1 of 16
Download to read offline
15 March, 2017
Juha-Pekka Tolvanen
jpt@metacase.com
Automating Safety Engineering
with Model-Based Techniques
Agenda
 Motivation
 A model-based approach
 Examples
 Demonstration
 Q&A
Motivation
 Safety engineering is quite expensive and tedious
– Requires considerable about of manual work
– Scales badly to larger systems
 Feedback to system and software design could be
improved
– Safety engineering flows do not always acknowledge
typical iterative/incremental development approach
* Copyright: Donald M. Mattox, Management Plus, Inc.
*
Model-based approach supports
safety design by:
1. Utilizing existing specifications with model
transformations
– Safety design must be related to what is developed (or
planned to be developed – also at early stages)
– Usually such nominal specifications already exists
2. Applying directly safety concepts in models
– Safety standards suggest already now own terminology
3. Linking safety related models to analytical tools
– Use models created (automatically) with various analysis
tools
– Different tools for different purposes
1) Utilize existing specifications
 Usually some designs or specifications already exist,
e.g. logical functions, hardware specification, behavior…
 Translate those models for safety (sample next slide)
1) Utilizing existing specifications
Model transformation
in MetaEdit+ tool
1) Error logic – partly generated
 Analyze error propagation directly in a model
ISO 26262 from 10.000 feet
 Define the item (functions) and preliminary architecture
 Determine how the item can fail (HAZOP or FMEA)
 Determine the driving scenarios that make the failures
hazardous
 Determine the exposure (E) to the hazard based on
the driving scenario
 Evaluate the severity (S) of the hazard
 Evaluate the controllability (C) by the operator
 Calculate the ASIL
 Verify your E and C assumptions
ISO 13849-1 from 10.000 feet
 Define the scope (usage, environment etc)
 Identify risk sources
 Estimate the risk
 Evaluate the risk
 Identify safety functions
 Calculate risks
 Use the results to reduce risks
2) Apply safety concepts directly
while modeling
 ISO26262
– Item
– Hazard
– HazardEvent
– SafetyGoal
– Requirement
– SafetyConcept
– …
Contains the
generated ErrorModel
Exports the error model
to HipHOPS tool
3) Link with analytical tools
Produced FTA
FMEA results
Scaled for larger systems
 FTA/FMEA with cut sets, unavailability,
costs, failure rates, repair rates
3) Different analytical tools
 Same model-based approach with another analysis tool
 Specification language adapted for specific needs
3) Link to another analysis tool
Produced
project data
Exports the model
to Sistema tool
Summary
 Use of model-based approach provides several benefits:
– Ensures that safety analysis is done for the
intended/designed architecture
– Makes safety analysis faster as it is partly automated
– Reduces error-prone routine work
– Makes safety analysis easier to use and accessible
 The presented approach is not tied to any particular tool
 Specification languages and related transformations
need to be flexible
 Extend the approach by providing feedback loop back
from analysis to original source models
Thank you!
Questions, please?
For references on examples and cases contact:
Juha-Pekka Tolvanen, jpt@metacase.com
www.metacase.com

More Related Content

What's hot

Rocca Fellow Pedroni
Rocca Fellow PedroniRocca Fellow Pedroni
Rocca Fellow Pedroni
Rocca Fellows
 
Enszer Physical Principle Demo Nd
Enszer Physical Principle Demo NdEnszer Physical Principle Demo Nd
Enszer Physical Principle Demo Nd
Intro Engineering
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
owenchambers11
 

What's hot (13)

Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
 
Exam – june 2010 – qp 11
Exam – june 2010 – qp 11Exam – june 2010 – qp 11
Exam – june 2010 – qp 11
 
Rocca Fellow Pedroni
Rocca Fellow PedroniRocca Fellow Pedroni
Rocca Fellow Pedroni
 
Enszer Physical Principle Demo Nd
Enszer Physical Principle Demo NdEnszer Physical Principle Demo Nd
Enszer Physical Principle Demo Nd
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
NUMERICAL METHOD AND ITS APPLICATION
NUMERICAL METHOD AND ITS APPLICATIONNUMERICAL METHOD AND ITS APPLICATION
NUMERICAL METHOD AND ITS APPLICATION
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
 
Risk Assessment
Risk Assessment Risk Assessment
Risk Assessment
 
Critis08 Q Ra
Critis08 Q RaCritis08 Q Ra
Critis08 Q Ra
 
Real-time Ranking of Electrical Feeders using Expert Advice
Real-time Ranking of Electrical Feeders using Expert AdviceReal-time Ranking of Electrical Feeders using Expert Advice
Real-time Ranking of Electrical Feeders using Expert Advice
 
Real-time ranking with concept drift using expert advice
Real-time ranking with concept drift using expert adviceReal-time ranking with concept drift using expert advice
Real-time ranking with concept drift using expert advice
 

Viewers also liked

Viewers also liked (16)

EU Funding Guide
EU Funding GuideEU Funding Guide
EU Funding Guide
 
An Introduction to boilerPRO
An Introduction to boilerPROAn Introduction to boilerPRO
An Introduction to boilerPRO
 
Unlocking your Creativity: Taking your ideas beyond
Unlocking your Creativity: Taking your ideas beyondUnlocking your Creativity: Taking your ideas beyond
Unlocking your Creativity: Taking your ideas beyond
 
Five Slides on Creativity and Innovation
Five Slides on Creativity and InnovationFive Slides on Creativity and Innovation
Five Slides on Creativity and Innovation
 
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
Haiti: Rapport Du Secrétaire General des Nations Unies Recommandant la Fermet...
 
mBot workshop
mBot workshopmBot workshop
mBot workshop
 
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
JWTを使った簡易SSOで徐々にシステムをリニューアルしている話
 
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri HakanenAsiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
Asiakas ja Asiakkuus - Tutkimus (2015) - Petri Hakanen
 
Workplace Bullying Quotes
Workplace Bullying QuotesWorkplace Bullying Quotes
Workplace Bullying Quotes
 
ディープラーニングハンズオンを準備して学んだこと
ディープラーニングハンズオンを準備して学んだことディープラーニングハンズオンを準備して学んだこと
ディープラーニングハンズオンを準備して学んだこと
 
アルゴリズムのイメージを擬人化する
アルゴリズムのイメージを擬人化するアルゴリズムのイメージを擬人化する
アルゴリズムのイメージを擬人化する
 
Michel Foucault, poder saber y constitucion sujeto moderno
Michel Foucault, poder saber y constitucion sujeto modernoMichel Foucault, poder saber y constitucion sujeto moderno
Michel Foucault, poder saber y constitucion sujeto moderno
 
Distribution and ex dividend dates-upto 17 mar-2017
Distribution and ex dividend dates-upto 17 mar-2017Distribution and ex dividend dates-upto 17 mar-2017
Distribution and ex dividend dates-upto 17 mar-2017
 
Six Trumps: Six Learning Principles that Trump Traditional Teaching
Six Trumps: Six Learning Principles that Trump Traditional TeachingSix Trumps: Six Learning Principles that Trump Traditional Teaching
Six Trumps: Six Learning Principles that Trump Traditional Teaching
 
エターナらないゲーム開発
エターナらないゲーム開発エターナらないゲーム開発
エターナらないゲーム開発
 
Violencia Virtual
Violencia VirtualViolencia Virtual
Violencia Virtual
 

Similar to Automating safety engineering with model based techniques

Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
githe26200
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
Marco Morana
 
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
powerofgametest
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
Xiao Qin
 

Similar to Automating safety engineering with model based techniques (20)

Asim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defenseAsim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defense
 
Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
Microsoft - Human-Operated Ransomware Mitigation Project Plan #nice #template...
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
 
Trends in Embedded Software Engineering
Trends in Embedded Software EngineeringTrends in Embedded Software Engineering
Trends in Embedded Software Engineering
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
Lecture5
Lecture5Lecture5
Lecture5
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
 
20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma
 
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
 
TRUSTSeminar.ppt
TRUSTSeminar.pptTRUSTSeminar.ppt
TRUSTSeminar.ppt
 
Sanjay
SanjaySanjay
Sanjay
 

More from Juha-Pekka Tolvanen

More from Juha-Pekka Tolvanen (12)

How to formalize a ubiquitous language into a domain-specific language.pdf
How to formalize a ubiquitous language into a domain-specific language.pdfHow to formalize a ubiquitous language into a domain-specific language.pdf
How to formalize a ubiquitous language into a domain-specific language.pdf
 
Measuring Productivity from Model-Based Development
Measuring Productivity from Model-Based DevelopmentMeasuring Productivity from Model-Based Development
Measuring Productivity from Model-Based Development
 
How domain specific modeling languages address variability: investigation of ...
How domain specific modeling languages address variability: investigation of ...How domain specific modeling languages address variability: investigation of ...
How domain specific modeling languages address variability: investigation of ...
 
Effort Used to Create Domain-Specific Modeling Languages
Effort Used to Create Domain-Specific Modeling LanguagesEffort Used to Create Domain-Specific Modeling Languages
Effort Used to Create Domain-Specific Modeling Languages
 
Collaborative language engineering and language use: demo with MetaEdit+
Collaborative language engineering and language use: demo with MetaEdit+Collaborative language engineering and language use: demo with MetaEdit+
Collaborative language engineering and language use: demo with MetaEdit+
 
Automotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL modelsAutomotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL models
 
Collaborative modeling and metamodeling
Collaborative modeling and metamodelingCollaborative modeling and metamodeling
Collaborative modeling and metamodeling
 
Collaborative modeling and metamodeling in MetaEdit+
Collaborative modeling and metamodeling in MetaEdit+Collaborative modeling and metamodeling in MetaEdit+
Collaborative modeling and metamodeling in MetaEdit+
 
20 examples on Domain-Specific Modeling Languages
20 examples on Domain-Specific Modeling Languages20 examples on Domain-Specific Modeling Languages
20 examples on Domain-Specific Modeling Languages
 
Model level debugging and profiling, Code Generation Conference 2014
Model level debugging and profiling, Code Generation Conference 2014Model level debugging and profiling, Code Generation Conference 2014
Model level debugging and profiling, Code Generation Conference 2014
 
Keynote at Code Generation 2014: The business cases of modeling and generators
Keynote at Code Generation 2014: The business cases of modeling and generatorsKeynote at Code Generation 2014: The business cases of modeling and generators
Keynote at Code Generation 2014: The business cases of modeling and generators
 
Industrial experiences on Domain-Specific Modeling
Industrial experiences on Domain-Specific ModelingIndustrial experiences on Domain-Specific Modeling
Industrial experiences on Domain-Specific Modeling
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 

Automating safety engineering with model based techniques

  • 1. 15 March, 2017 Juha-Pekka Tolvanen jpt@metacase.com Automating Safety Engineering with Model-Based Techniques
  • 2. Agenda  Motivation  A model-based approach  Examples  Demonstration  Q&A
  • 3. Motivation  Safety engineering is quite expensive and tedious – Requires considerable about of manual work – Scales badly to larger systems  Feedback to system and software design could be improved – Safety engineering flows do not always acknowledge typical iterative/incremental development approach * Copyright: Donald M. Mattox, Management Plus, Inc. *
  • 4. Model-based approach supports safety design by: 1. Utilizing existing specifications with model transformations – Safety design must be related to what is developed (or planned to be developed – also at early stages) – Usually such nominal specifications already exists 2. Applying directly safety concepts in models – Safety standards suggest already now own terminology 3. Linking safety related models to analytical tools – Use models created (automatically) with various analysis tools – Different tools for different purposes
  • 5. 1) Utilize existing specifications  Usually some designs or specifications already exist, e.g. logical functions, hardware specification, behavior…  Translate those models for safety (sample next slide)
  • 6. 1) Utilizing existing specifications Model transformation in MetaEdit+ tool
  • 7. 1) Error logic – partly generated  Analyze error propagation directly in a model
  • 8. ISO 26262 from 10.000 feet  Define the item (functions) and preliminary architecture  Determine how the item can fail (HAZOP or FMEA)  Determine the driving scenarios that make the failures hazardous  Determine the exposure (E) to the hazard based on the driving scenario  Evaluate the severity (S) of the hazard  Evaluate the controllability (C) by the operator  Calculate the ASIL  Verify your E and C assumptions
  • 9. ISO 13849-1 from 10.000 feet  Define the scope (usage, environment etc)  Identify risk sources  Estimate the risk  Evaluate the risk  Identify safety functions  Calculate risks  Use the results to reduce risks
  • 10. 2) Apply safety concepts directly while modeling  ISO26262 – Item – Hazard – HazardEvent – SafetyGoal – Requirement – SafetyConcept – … Contains the generated ErrorModel
  • 11. Exports the error model to HipHOPS tool 3) Link with analytical tools Produced FTA FMEA results
  • 12. Scaled for larger systems  FTA/FMEA with cut sets, unavailability, costs, failure rates, repair rates
  • 13. 3) Different analytical tools  Same model-based approach with another analysis tool  Specification language adapted for specific needs
  • 14. 3) Link to another analysis tool Produced project data Exports the model to Sistema tool
  • 15. Summary  Use of model-based approach provides several benefits: – Ensures that safety analysis is done for the intended/designed architecture – Makes safety analysis faster as it is partly automated – Reduces error-prone routine work – Makes safety analysis easier to use and accessible  The presented approach is not tied to any particular tool  Specification languages and related transformations need to be flexible  Extend the approach by providing feedback loop back from analysis to original source models
  • 16. Thank you! Questions, please? For references on examples and cases contact: Juha-Pekka Tolvanen, jpt@metacase.com www.metacase.com