Software Engineering Institute

Most of my work at the SEI involves AADL, and you can view a rough timeline of “highlights” here, or see a full list of my publicly-available materials on my SEI author page.

Overview of AADL’s role in transitioning research to practice, you can also view the slides


Safety Analysis and Fault Detection Isolation and Recovery Synthesis for Time-Sensitive Cyber-Physical Systems

The Safety Analysis and Fault Detection Isolation and Recovery Synthesis for Time-Sensitive Cyber-Physical Systems (SAFIR) project is a three-year effort to study architecture-centric safety techniques for increasingly-autonomous cyber-physical systems. In addition to working on ASAP (see below), I have published papers with other team members on the use of contracts in system design and the generation of assurance argumentation from system requirements.

Architecture-Supported Audit Processor

One of the tasks I worked on in SAFIR (and ISSE, see below) is the Architecture-Supported Audit Processor or ASAP. ASAP is a software plugin for the OSATE workbench which presents safety-specific views of a system’s architecture. Installation instructions and source code are on the project’s github page, and you can read about the work in the ERTS22 publication.


Integrated Safety and Security Engineering

The Integrated Safety and Security Engineering (ISSE) project was a three-year effort looking at the degree to which safety engineering and security engineering can be harmonized when using architectural modeling tools like AADL. This

The AADL Error Library: An Operationalized Taxonomy of System Errors

A podcast discussing the EMV2 Error Library

The AADL Error Modelling Annex (EMV2, which was developed prior to this project) includes an Error Library. It both embeds a considerable amount of knowledge from academic research and industrial experience and is directly usable in AADL models. Peter Feiler and I wrote a a paper for the HILT18 workshop on the topic, produced a blog post, and made a podcast describing the effort.


Guided Architecture Trade Space Exploration

A longer podcast-style discussion of the GATSE project
A short overview of the GATSE project

I was the PI on a small research project looking at how user-guided exploration of what’s known as a system’s “trade space” might work. This work consists of extending OSATE to automatically explore potential design options in a system and then evaluate them using existing AADL analysis techniques. The code lives over on github, and you can watch a short presentation on the project, read a post on the SEI blog about the work, our 2021 paper from SoSyM, the 2019 paper from the MODELS conference, (or view the slides).


Automated Analysis and Security Policy Enforcement

A presentation I gave on the overall AASPE project — you can also view the slides

Automated Analysis and Security Policy Enforcement (AASPE) was a research project led by Julien Delange and Peter Feiler, and it began before I joined the SEI. It looked primarily at specifying and verifying the separation of different portions of a system (ie, keeping sensor data and control commands separate) as well as analyzing the impacts of potential attacks. I discussed this project, and other security aspects of AADL, in Episode 390 of the Software Engineering Radio Podcast.

SAFE and Secure

With my background in safety, I looked at safety and security co-analysis under the auspices of AASPE. The result of this effort was a SAW17 publication (slides here, also summarized in two blog posts) that describes some of the security applications of SAFE.