Tutorial Descriptions
 

Fault tolerance against design faults: Design principles and reliability assessment
by Bev Littlewood and Lorenzo Strigini, Centre for Software Reliability, City University, UK
The tutorial introduces principles for fault tolerant software design as well as methods for estimating how much reliability can be gained by the use of such principles. The aim is to explain fundamental concepts and communicate research results about the reliability growth that can be expected when software fault tolerance methods are used. The overall objective is to assist designers and assessors of critical software systems.



Safety Cases and COTS/SOUP

by Robin E Bloomfield and Peter Bishop, Adelard and CSR, City University, UK
The tutorial presents an approach for justifying the use of  "software of uncertain pedigree" (SOUP) and COTS in safety related applications. The approach is based on the presenters' practical experience of assessing SOUP used in critical applications. The safety assurance of SOUP is centers on a documented, five-phase safety justification (safety case) that sets out the safety claims for the system as well as the evidence and arguments that support them.
 

Building Dependable Systems: the Power of Negative Thinking
by Chuck Howell, The MITRE Corporation, USA
The natural human tendency is to focus on the positive functional capabilities a new software intensive system will provide. However, for critical systems, there is much to be gained from "negative thinking": at each stage of development, from requirements capture, design and construction  through to testing and validation, considering all the ways things could go wrong. This tutorial will  illustrate the importance of "negative thinking" techniques such as hazard analysis, stress testing and fault injection amongst others.
 

Intrusion Tolerance: Concepts and Design Principles

by Paulo Verissimo, Department of Informatics, University of Lisboa, Portugal
Intrusion tolerance, the ability to continue operating and providing (albeit degraded service), is the hallmark of next generation security systems. It is also currently the topic of a substantial research effort in the US and Europe. This tutorial reviews previous results in the light of intrusion tolerance, introduces the fundamental ideas and presents recent advances of the state of the art brought about by the aforementioned research effort.