Software Engineering Institute

The Software Engineering Institute

Most of my work at the SEI involves AADL, and you can view a rough timeline of “highlights” here, or see a full list of my publicly-available materials on my SEI author page.

Overview of AADL’s role in transitioning research to practice, you can also view the slides

2022-2023

Safety Analysis and Fault Detection Isolation and Recovery Synthesis for Time-Sensitive Cyber-Physical Systems

The Safety Analysis and Fault Detection Isolation and Recovery Synthesis for Time-Sensitive Cyber-Physical Systems (SAFIR) project is a three-year effort to study architecture-centric safety techniques for increasingly-autonomous cyber-physical systems. In addition to working on ASAP and the OSATE Slicer (see below), I have published papers with other team members on the use of contracts in system design and the generation of assurance argumentation from system requirements.

The OSATE Slicer: Graph-Based Reachability for Architectural Models

Many of the architectural analyses that run on AADL are fundamentally reachability queries. Prior work at K-State by Hari Thiagarajan demonstrated the utility of these queries; in this work I developed, evaluated, and benchmarked a highly-optimized query execution plugin that follows existing OSATE implementation patterns. You can read a summary of this work on the SEI Blog, or get the full details in the ECMFA23 publication, and download the supplementary files if you’re interested in re-running or extending the evaluation.

Architecture-Supported Audit Processor

One of the tasks I worked on in SAFIR (and ISSE, see below) is the Architecture-Supported Audit Processor or ASAP. ASAP is a software plugin for the OSATE workbench which presents safety-specific views of a system’s architecture. Installation instructions and source code are on the project’s github page, and you can read about the work in the ERTS22 publication.

2020-2021

Integrated Safety and Security Engineering

The Integrated Safety and Security Engineering (ISSE) project was a three-year effort looking at the degree to which safety engineering and security engineering can be harmonized when using architectural modeling tools like AADL. This

The AADL Error Library: An Operationalized Taxonomy of System Errors

A podcast discussing the EMV2 Error Library

The AADL Error Modelling Annex (EMV2, which was developed prior to this project) includes an Error Library. It both embeds a considerable amount of knowledge from academic research and industrial experience and is directly usable in AADL models. Peter Feiler and I wrote a a paper for the HILT18 workshop on the topic, produced a blog post, and made a podcast describing the effort.

2019

Guided Architecture Trade Space Exploration

A longer podcast-style discussion of the GATSE project
A short overview of the GATSE project

I was the PI on a small research project looking at how user-guided exploration of what’s known as a system’s “trade space” might work. This work consists of extending OSATE to automatically explore potential design options in a system and then evaluate them using existing AADL analysis techniques. The code lives over on github, and you can watch a short presentation on the project, read a post on the SEI blog about the work, our 2021 paper from SoSyM, the 2019 paper from the MODELS conference, (or view the slides).

2017

Automated Analysis and Security Policy Enforcement

A presentation I gave on the overall AASPE project — you can also view the slides

Automated Analysis and Security Policy Enforcement (AASPE) was a research project led by Julien Delange and Peter Feiler, and it began before I joined the SEI. It looked primarily at specifying and verifying the separation of different portions of a system (ie, keeping sensor data and control commands separate) as well as analyzing the impacts of potential attacks. I discussed this project, and other security aspects of AADL, in Episode 390 of the Software Engineering Radio Podcast.

SAFE and Secure

With my background in safety, I looked at safety and security co-analysis under the auspices of AASPE. The result of this effort was a SAW17 publication (slides here, also summarized in two blog posts) that describes some of the security applications of SAFE.