Methodological approach to identifying software bugs in special software for systems of critical applications
Authors: Andreev A.G., Kazakov G.V., Koryanov V.V.
Published in issue: #7(115)/2021
DOI: 10.18698/2308-6033-2021-7-2096
Category: Aviation and Rocket-Space Engineering | Chapter: Innovation Technologies of Aerospace Engineering
The paper focuses on a methodological approach to identifying software in special software for systems of critical applications. The approach relies on the analysis of the subject area associated with the functioning of such systems. The term ‘software bugs’ is local and depends on the system into which they are embedded. In this regard, the methodological approach to identifying software bugs is illustrated by an automated system for preparing data for aircraft flights. By software bugs, we mean malicious software that can affect the algorithms for the functioning of the system, disrupting the normal mode of its operation and causing significant damage to the goals of the system. To find where software bugs are likely to be embedded, we specified actions which consist in understanding the features of assessing the quality of each of the main elements of the system and the essence of software bugs, with account for the features of the automated data preparation system; describing the system and its specifics; determining the most likely place for embedding software bugs and conditions for their initialization.
References
[1] Kazarin O.V. Bezopasnost programmnogo obespecheniya kompyuternykh sistem [Computer systems software security]. Monograph. Moscow, BMSTU Mytischi Branch Publ., 2003, 212 p.
[2] Grover D., ed. The Protection of Computer Software — its Technology and Applications. Cambridge University Press, 1989. [In Russ.: Grover D., et al. Zaschita programmnogo obespecheniya. Moscow, Mir Publ., 1992, 120 p.].
[3] Naumov A.A., Aidinyan A.R. Inzhenerny vestnik Dona — Engineering journal of Don, 2018, no. 2. Available at: http://www.ivdon.ru/ru/magazine/archive/N2y2018/4946
[4] Lipaev V.V. Nadezhnost i funktsionalnaya bezopasnost kompleksov programm realnogo vremeni [Reliability and functional safety of real-time software complexes]. Saratov, Vuzovskoe obrazovanie Publ., 2015, 207 p.
[5] Andreev A.G., Kazakov G.V., Koryanov V.V. Inzhenerny zhurnal: nauka i innovatsii — Engineering Journal: Science and Innovation, 2018, iss. 6. http://dx.doi.org/10.18698/2308-6033-2018-6-1771
[6] Branitskiy A.A., Kotenko I.V. Trudy SPIIRAN — SPIIRAS Proceedings, 2016, no. 2, pp. 207–244. https://doi.org/10.15622/sp.45.13
[7] Buldakova T.I., Dzhalolov A.Sh. Inzhenerny zhurnal: nauka i innovatsii — Engineering Journal: Science and Innovation, 2013, iss. 11. http://dx.doi.org/10.18698/2308-6033-2013-11-987
[8] Andreev A.G., Kazakov G.V., Koryanov V.V. Izvestiya vysshikh uchebnykh zavedeniy. Mashinostroenie — BMSTU Journal of Mechanical Engineering, 2018, no. 6, pp. 86–95.
[9] Drobotun E.B. Teoreticheskie osnovy postroeniya sistem zaschity ot kompyuternykh atak dlya avtomatizirovannykh sistem upravleniya [Theoretical foundations of building protection systems against computer attacks for automated control systems]. Monograph. St. Peterburg, Naukoemkie tekhnologii Publ., 2017, 120 p.
[10] Andreev A.G., Kazakov G.V. Trudy 4 TsNII Minoborony Rossii (Proceedings of the 4th Central Research Institute of the Ministry of Defence of the Russian Federation), no. 150, vol. 1, part 3. Korolyov, 2019, pp. 84–88.
[11] Andreev A.G., Kazakov G.V., Solovev Yu.S. Izvestiya VA RVSN imeni Petra Velikogo (Proceedings of the Peter the Great Military Academy of Strategic Rocket Troops), 2018, no. 280, pp. 26–38.
[12] Sikharulidze Yu.G. Ballistika i navedenie letatelnykh apparatov [Aircraft ballistics and guidance]. 4th ed., enl. Moscow, Laboratoriya znaniy Publ., 2020, 410 p.