Alexey Khoroshilov
YOU?
Author Swipe
View article: Open Source Certification and Educational Process
Open Source Certification and Educational Process Open
This paper discusses possibilities to benefit software engineering and computer sciences educational process from involving students in open source software certification activities. On the other hand the open source certification communit…
View article: Robust Resource Partitioning Approach for ARINC 653 RTOS
Robust Resource Partitioning Approach for ARINC 653 RTOS Open
Modern airborne operating systems implement the concept of robust time and resource partitioning imposed by the standards for aerospace and airborne-embedded software systems, such as ARINC 653. While these standards do provide a considera…
View article: Elicitation of functional requirements from the application programming interface documentation for functional testing
Elicitation of functional requirements from the application programming interface documentation for functional testing Open
We address a common problem in this paper. The only available documentation for a computer program consists of a user API documentation while we need to identify functional requirements and build test suite to test them. We describe a tech…
View article: Cross-platform graphics subsystem for an ARINC 653-compatible real-time operating system
Cross-platform graphics subsystem for an ARINC 653-compatible real-time operating system Open
In the development of modern cockpits, there is a trend towards the use of large displays that combine information about air navigation and the status of aircraft equipment. Flight and equipment performance information generated by multipl…
View article: Runtime Verification of Operating Systems Based on Abstract Models
Runtime Verification of Operating Systems Based on Abstract Models Open
High complexity of a modern operating system (OS) requires to use complex models and high-level specification languages to describe even separated aspects of OS functionality, e.g., security functions. Use of such models in conformance ver…
View article: Building a methodology for secure system software development on the example of operating systems
Building a methodology for secure system software development on the example of operating systems Open
System software is a cornerstone of any software system, so building secure system software in accordance with requirements of certification authorities and state-of-the-art practices is an important scientific and technical problem. One o…
View article: Verification of Compliance for Multilevel Models in Individual Trace Semantics
Verification of Compliance for Multilevel Models in Individual Trace Semantics Open
The paper considers the problem of verification of compliance between models representing the same system on different level of abstraction. The existing approaches are mostly based on refinement relation. But the models representing indus…
View article: Architecture of a Machine Code Deductive Verification System
Architecture of a Machine Code Deductive Verification System Open
In recent years, ISP RAS has been developing a system for machine (binary) code deductive verification. The motivation is rather clear: modern compilers, such as GCC and Clang/LLVM, are not free of bugs; thereby, it is not superfluous (at …
View article: Monitoring and Testing Based on Multi-Level Program Specifications
Monitoring and Testing Based on Multi-Level Program Specifications Open
Research on formal methods of software development and verification focuses on building specifications using incremental and iterative development methodologies. The presence of several levels of specifications simplifies proving of proper…
View article: Verification of Compliance for Multilevel Models in Individual Trace Semantics
Verification of Compliance for Multilevel Models in Individual Trace Semantics Open
The paper considers the problem of verification of compliance between models representing the same system on different level of abstraction. The existing approaches are mostly based on refinement relation. But the models representing indus…
View article: Rendering System for the Aircraft Real-Time OS JetOS
Rendering System for the Aircraft Real-Time OS JetOS Open
The paper discusses the creation of rendering systems for airborne civil aviation systems. All software used on board must comply with internationally accepted safety standards. This imposes additional requirements on both the hardware use…
View article: Multi-windows Rendering Using Software OpenGL in Avionics Embedded Systems
Multi-windows Rendering Using Software OpenGL in Avionics Embedded Systems Open
Elaboration of modern airplane cockpit has tendency to use large displays instead of a lot of separate indicators. The large display should combine information about flight navigation and state of plane equipment. Information coming from a…
View article: Requirements management for safety-critical systems. Overview of solutions
Requirements management for safety-critical systems. Overview of solutions Open
Requirements are an integral part of any software and hardware development process. The area where requirements become significantly important is the development of safety-critical systems which usage may cause risks on human lives. So the…
View article: Requirements management for safety-critical systems. Overview of solutions
Requirements management for safety-critical systems. Overview of solutions Open
Requirements are an integral part of any software and hardware development process. The area where requirements become significantly important is the development of safety-critical systems which usage may cause risks on human lives. So the…
View article: Formalizing Metamodel of Requirements Management System
Formalizing Metamodel of Requirements Management System Open
Requirements play an important role in the process of safety critical software development. To achieve reasonable quality and cost ratio a tool support for requirements management is required. The paper presents a formal definition of a me…
View article: Introduction to CEGAR —Counter-Example Guided Abstraction Refinement
Introduction to CEGAR —Counter-Example Guided Abstraction Refinement Open
Precision, completeness and scalability of static verification tools have dramatically improved over the last decade. In particular, automatic checking of moderate-sized software systems has been made possible due to development of CEGAR —…
View article: Component-based verification of operating systems
Component-based verification of operating systems Open
The paper presents recent results on the way towards accurate and complete verification of industrial operating systems (OS). We consider here OSes, either of general purpose or actively used in some industrial domain, elaborated and maint…
View article: On representation of simulation time in functional programming style
On representation of simulation time in functional programming style Open
Functional programming plays the big role in the modern computer science and its importance is growing. This is not accidential: this approach helps to create better and more reliable software that is easy to reason about (both manually an…
View article: In-Kernel Memory-Mapped I/O Device Emulation
In-Kernel Memory-Mapped I/O Device Emulation Open
Device emulation is a common necessity that arises at various steps of the development cycle, hardware migration, or reverse-engineering. While implementing the algorithms behind the device may be a nontrivial task by itself, connecting th…
View article: Formalizing Metamodel of Requirements Management System
Formalizing Metamodel of Requirements Management System Open
Requirements play an important role in the process of safety critical software development. To achieve reasonable quality and cost ratio a tool support for requirements management is required. The paper presents a formal definition of a me…
View article: Building Modular Real-time software from Unified Component Model
Building Modular Real-time software from Unified Component Model Open
Modern real-time operating systems are complex embedded product made by many vendors: OS vendor, board support package vendor, device driver developers, etc. These operating systems are designed to run on different hardware; the hardware o…
View article: ADV_SPM — Formal security policy models in practice
ADV_SPM — Formal security policy models in practice Open
The paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria…
View article: VERIFICATION OF OPERATING SYSTEM COMPONENTS
VERIFICATION OF OPERATING SYSTEM COMPONENTS Open
The paper concerns recent advances in reaching the goal of industrial operating system (OS) verification.By industrial OS we mean a system actively used in some industrial domain, elaborated and maintained for a significant time, not a pro…
View article: Using modularization in embedded OS
Using modularization in embedded OS Open
Modern embedded OS are designed to be used in control solutions in various hardware contexts. Control computers may differ in the architecture of the CPU, the structure of communication channels, supported communication protocols, etc. Emb…
View article: Design and architecture of real-time operating system
Design and architecture of real-time operating system Open
Modern airliners such as Airbus A320, Boeing 787, and Russian MS-21 use so called Integrated Modular Avionics (IMA) architecture for airborne systems. This architecture is based on interconnection of devices and on-board computers by means…
View article: Adjustable method with predicate abstraction for detection of race conditions in operating systems
Adjustable method with predicate abstraction for detection of race conditions in operating systems Open
The paper presents a configurable method of static data race detection that is trying to keep a balance between resource consumption and a number of false alarms. The method is based on well known Lockset approach. It uses simplified memor…