This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:safeav:as:vvintro [2025/06/16 01:42] – ToDo checked: rahulrazdan | en:safeav:as:vvintro [2025/06/28 16:01] (current) – rahulrazdan | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| <todo @rahulrazdan # | <todo @rahulrazdan # | ||
| + | |||
| + | As discussed in the governance module, whatever value products provide to their consumers is weighed against the potential harm caused by the product, and leads to the concept of legal product liability. From a product development perspective, | ||
| + | |||
| + | {{: | ||
| + | |||
| + | Fig. 1. V&V and Governance Framework. | ||
| + | The Master V& | ||
| + | - Operational Design Domain (ODD): This defines the environmental conditions and operational model under which the product is designed to work. | ||
| + | - Coverage: This defines the completeness over the ODD to which the product has been validated. | ||
| + | - Field Response: When failures do occur, the procedures used to correct product design shortcomings to prevent future harm. | ||
| + | As figure 1 shows, the Verification & Validation (V&V) process is the key input into the governance structure which attaches liability, and per the governance structure, each of the elements must show “reasonable due diligence.” | ||
| + | |||
| + | |||
| + | {{: | ||
| + | Fig. 2. Execution is space. | ||
| + | |||
| + | Mechanically, | ||
| + | - Test Generation: From the allowed ODD, test scenarios are generated. | ||
| + | - Execution: | ||
| + | - Criteria for Correctness: | ||
| + | |||
| + | In practice, each of these steps can have quite a bit of complexity and associated cost. Since the ODD can be a very wide state space, intelligently and efficiently generating the stimulus is critical. Typically, in the beginning, stimulus generation is done manually, but this quickly fails the efficiency test in terms of scaling. In virtual execution environments, | ||
| + | |||
| + | {{: | ||
| + | |||
| + | The execution stage can be done physically (such as test track above), but this process is expensive, slow, has limited controllability and observability, | ||
| + | The observable results of the stimulus generation are captured to determine correctness. Correctness is typically defined by either a golden model or an anti-model. | ||
| + | The MaVV consists of building a database of the various explorations of the ODD state space, and from that building an argument for completeness. The argument typically takes the nature of a probabilistic analysis. After the product is in the field, field returns are diagnosed, and one must always ask the question: Why did not my original process catch this issue? Once found, the test methodology is updated to prevent issues with fixes going forward. The V&V process is critical in building a product which meets customer expectations and documents the need for " | ||
| + | |||
| + | Finally, the product development process is typically focused on defining an ODD and validating against that situation. However, in modern times, an additional concern is that of adversarial attacks (cybersecurity). In this situation, an adversary wants to high jack the system for nefarious intent. In this situation, the product owner must not only validate against the ODD, but also detect when the system is operating outside the ODD. After detection, the best case scenario is to safely redirect the system to the ODD space. The risk associated with cybersecurity issues typically split at three levels for cyber-physical systems: | ||
| + | - OTA Security: | ||
| + | - Remote Control Security: | ||
| + | - Sensor Spoofing: | ||
| + | |||
| + | In terms of governance, some reasonable due-diligence is expected to be provided by the product developer in order to minimize these issues. The level of validation required is dynamic in nature and connected to the norm in the industry. | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||