No Slide Title

Download Report

Transcript No Slide Title

The Systems Assurance Group
Dr Jaspal Sagoo
Systems Assurance Group
QinetiQ Trusted Information Management
Malvern Technology Centre
QinetiQ
• Defence & Technology
• Security & Dual Use
• US
2
QTIM
3
QinetiQ Trusted Information Management
Organn
isation Chrttle
Director
1
Duncan Hine
111111111
Strategic Business
Development
'
Sales & Marketing
1
Dave Knowles
Business Support
Mark Baggott
1
Neil MacKenzie
Trusted Information
Management Inc '
Secure Products
'
Technology Analysts
'
Andy Bates
Major Bids
Finance
'
'
Shane Slater
(N. American Operations)'
'' Sharon
Lewis
'Nic Peeling
Jim Shea
Major Programmes
'
Digital Investigation
'1Services
Richard Cambridge
'
Dave Bacon
Professional Services
Enterprise Security
'
Systems Assurance
'
Colin Nash
Colin O'Halloran
Practice Lead
'
Debi Ashenden
Security Health Check
'
Paul Hopkins
Trusted Solutions &
Services
'
Alan Watson
The Systems Assurance Group
• Dependability of systems:
– Safety , Security, fault tolerance
• Provide assurance that systems are dependable
– Formal modelling and analysis
CSP, Z , Model Checking, Theorem Proving, Refinement
– Assessment of systems
Safety analysis techniques
• Type of Work
– Research
– Project Support
Defence
Commercial
4
Systems Assurance Group Structure
5
Prof. Colin O'Halloran
Business Group
Manager
Dr Clive Pygott
Deputy
BGM
Dr Philip Core
Technical Strategy
Support
Transport
Sue Jones
Operations
Manager
Howard Manning
John Evans
Project Mgt Team
Nick Tudor
Business Development
Manager
Dr Mike Hill
Software Assessment
Dr Sadie Creese
Security
Assurance
Nick Moffat
Dr William
Simmonds
Alan Miao
Judy Beckett
PA to BGM
Office Manager
Project Support Assistant
Mark Adams
Software Verification
& Theorem Proving
Capability
Dr Jaspal Sagoo
Dr Karen Stephenson
Assurance Research & Application
Model Based Assurance
Dr Clive Pygott
Project safety
Helen Roscoe
Anthony Smith
Iain Brown
Karen Barnett
Isobel Thompson
Dr Jeremy
Hubbard
Andy Cole
Dr Simon
Brown
Dennis Carver
Liz Whiting
Anthony Doggett
Duncan Stuart
Alf Smith
Jamie Hodgkinson
Merlin March
Phil Clayton
Tim Hawkins
Mark Teasedale
Richard Harrison
Gaius Wilson
Patrick Godlonton
Development and application of software analysis
techniques
• Language development
– development of ‘safe’ language subsets
– typically considers Ada and C
– new languages like C++, Java, SOAR and JACK
• Assessment tools
– compliance analysis
– Malporte analysis
6
7
Software Analysis
• Compliance analysis
– shows ‘correctness’ of code wrt specification
– translate informal spec into Z
– refinement argument supported by formal proof assisted
by a theorem prover
Overview of the Control Laws in Z (ClawZ) Process
8
Spec
Simulink
SPARK Ada
Refinement Script
Generator
Z Producer
Refinement
Z
Supertac
Verification Conditions
ProofPower
Discharge proof
Compliance Notation
Tool
Static code analysis
• Malporte (MALvern Predictor Of Run-Time Errors)
– statically checks for integrity properties such as:
Run-time errors
Undefined behaviour
Run-time exceptions
– Checks Ada, C, C++ code
•
Checks for error such as
– Buffer over-runs
– Divide by zero
– Use of pointers and unions in C
– Integer and floating point over/under flow
9
10
Used on …
• Numerours MoD projects such as Eurofighter Typhoon & Nimrod
• Secure webserver application
• Trial carried out with an automotive supplier
• Security analysis of SendMail server
Safety Assurance
11
• Hazard identification and Safety case review
– Generation of HAZOPs, PHA
– Review of delivered safety evidence
• Safety case methods
– development and use of tools to manage the integration of evidence from diverse sources
– compilation of safety cases
– Modular safety cases
• Advice to policy bodies on standards for safety critical systems
– MoD’s review of standards
– secretary of RTCA committee developing future Avionics standards
– reports to the European Commission on the requirements for future air traffic management (Ariba) and healthcare standards
• Advice to MoD projects on high integrity software
Security Assurance
• Security of Pervasive computing systems
–
FORWARD project funded by DTI
– Authentication & key management
– Securing blue tooth
– Interoperability of devices
– Quality of service
• Quantum Cryptography
– ESPIRIT Framework VI
– Development of techniques to produce security arguments
• Irish E-voting
• MAFTIA (Malicious & Accidental Fault Tolerant Internet Applications)
– ESPIRIT Framework V
– Verifying security mechanisms/schemes
12
Development and application of system analysis
techniques
• Formal modelling and analysis of communicating systems
– verification of security and safety properties
– can be applied to legacy and COTS products
• Formal modelling and analysis techniques applied to digital hardware
– verification of critical ASIC design
– processor obsolescence issues
– ASIC audits
• Assessment of the impact of emerging technology on system safety
– the impact of neural networks and agent technology on system safety
– effect of move to IMA on certification
• Robust System Of Systems (RSOS)
13
14
Student recruitment
• Firm foundations in traditional areas:
– Computer Science
– Formal techniques
– Software Engineering