Architecture-Centered Integrated Verification

Architecture-Centered Integrated Verification

Yujian Fu (Alabama A & M University, USA), Zhijang Dong (Middle Tennessee State University, USA) and Xudong He (Florida International University, USA)
DOI: 10.4018/978-1-61350-456-7.ch202
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The approach aims at solving the above problems by including the analysis and verification of two different levels of software development process–design level and implementation level-and bridging the gap between software architecture analysis and verification and the software product. In the architecture design level, to make sure the design correctness and attack the large scale of complex systems, the compositional verification is used by dividing and verifying each component individually and synthesizing them based on the driving theory. Then for those properties that cannot be verified on the design level, the design model is translated to implementation and runtime verification technique is adapted to the program. This approach can highly reduce the work on the design verification and avoid the state-explosion problem using model checking. Moreover, this approach can ensure both design and implementation correctness, and can further provide a high confident final software product. This approach is based on Software Architecture Model (SAM) that was proposed by Florida International University in 1999. SAM is a formal specification and built on the pair of component-connector with two formalisms – Petri nets and temporal logic. The ACV approach places strong demands on an organization to articulate those quality attributes of primary importance. It also requires a selection of benchmark combination points with which to verify integrated properties. The purpose of the ACV is not to commend particular architectures, but to provide a method for verification and analysis of large scale software systems in architecture level. The future research works fall in two directions. In the compositional verification of SAM model, it is possible that there is circular waiting of certain data among different component and connectors. This problem was not discussed in the current work. The translation of SAM to implementation is based on the restricted Petri nets due to the undecidable issue of high level Petri nets. In the runtime analysis of implementation, extraction of the execution trace of the program is still needed to get a white box view, and further analysis of execution can provide more information of the product correctness.
Chapter Preview
Top

Introduction

A software architecture (SA) design provides a high-level abstraction of system topology, functionality, and/or behavior ((Shaw, M. and Garlan, D., 1996), (Perry, D. E. and Wolf, A. L.,1992), (Taylor, R. N. et al., 2009)), which provides a basis for system understanding and analysis as well as a foundation for subsequent detailed design and implementation. Therefore, software architecture plays a critical role in the software development process. In the past decade, tremendous research ((Luckham, D., et al., 1995), (Taylor, R. N., et al., 1996), (Roshandel, R., et al.,2004),(Medvidovic, N., et al., 1996,2002,200,2006),(He, X., et al.,2002,2004),(Fu, Y., et al.,2007)) has been done on software description languages and their analysis.

There are two main research groups in the field of software architectures: one group has focused on the architectural abstraction, and semantic analysis of architectures, while the other present a framework adopting object oriented reuse concepts for software architectures. The first group has focused on architectural design abstractions called styles and the semantics underpinning (Shaw, M. and Garlan, D., 1996). Various formal architecture description languages (ADLs) ((Luckham, D., et al.,1995),(Allen, R. J., 1997), (Taylor, R. N., et al., 1996),(Lu L., et al., 2002), (Vestal, S., 1998)) and their supporting tools ((Medvidovic, N., et al., 1996), (Vestal, S., 1998) have emerged from this body of research over the decades (N. Medvidovic & R.N. Taylor, 2000). To date, most architectural tools have focused on the simulation and analysis of architectural models to exploit the semantic power of ADLs. However, the analysis and verification of various ADLs are still a very challenging issue due to syntax and semantics problems ((Clarke, E.M., et al., 2000), (Pnueli, A.,1985)). In other words, it is not enough to generate correct products.

The second group has focused on providing software frameworks, often through object-oriented reuse techniques such as design patterns and object hierarchies. A framework is a skeleton set of software modules that may be tailored for building domain-specific applications, typically resulting in increased productivity and faster time-to-market (Fregonese, G., et al., 1999). This approach has lead to creation of a variety of mediate techniques and associated commercial technologies for component-based development ((Shannon, B., et al., 2000), (Williams, S. & Kindel, C., 1994), (Discussion of the Object Management Architecture, 1997)). However, software implementations resulting from such use of frameworks often differ widely from conceptual models and lack adequate semantic underpinnings for analytic purposes.

Analysis of software architecture is not enough to generate correct product due to two reasons. On one hand, not all properties can be verified at design level because of the state space explosion problem, verification costs and characteristics of open-system. On the other hand, a correct and valid software architecture design does not ensure a correct implementation due to the error-prone characteristics of the software development process. At the same time, insufficient progress has been made on supporting implementation of applications based ADL models (Medvidovic, N. & Taylor, R.N., 2000).

Complete Chapter List

Search this Book:
Reset