Overcoming Software System Misuse by Domain Knowledge

Reuven Gallant, Leah Goldin


Often a perfectly functioning software system is misused causing undesirable and expensive consequences. The quest of this work is to prepare a priori the system for eventual extensions that – while not directly relevant to the system purpose – enable overcoming the consequences of its misuse. This is attained by means of domain knowledge to model the system misuse, beyond the original system model. In particular, if the behaviors of such a system have been modeled by statechart diagrams, these diagrams can be reengineered to suitably extend them, in order to correct the misbehavior consequences.


  1. Alexander, I.: Misuse Cases: Use Cases with Hostile Intents, IEEE Software, pp. 58-66, (2003).
  2. Exman, I.: Misbehavior Discoverythrough Unified Software-Knowledge Models, in Knowledge Discovery, Knowledge Engineering and Knowledge Management, 3rd Int. Joint Conference, IC3K 2011, Paris, France, October 26-29, Revised Selected Papers, pp. 350- 361, Springer-Verlag, Heidelberg, Germany, (2011).
  3. Goldin, L. and Gallant, R.: Reengineered PFA: An Approach for Reinvention of Behaviorally-Rich Systems, In Proc. SKY'2012 Int. Workshop on Software Knowledge, Barcelona, Spain, October 2012, SciTe Press, Portugal, (2012).
  4. Harel, D. and Kugler, H.:The Rhapsody Semantics of Statecharts (or, On the Executable Core of the UML), Integration of Software Specification Techniques for Applications in Engineering, (H. Ehrig et al., eds.), Lecture Notes in Computer Science, Vol. 3147, Springer-Verlag, pp. 325-354, (2004).
  5. Hope, P., McGraw, G. and Anton, A. I.: Misuse and Abuse Cases: Getting Past the Positive, IEEE Security and Privacy, pp. 32-34 May/June (2004).
  6. Jackson, M. A.: Software Requirements & Specifications, Addison-Wesley, Boston, MA, USA, (1996).
  7. Jackson, M.A.: Problem Frames: Analysing and Structuring Software Development Problems, Addison-Wesley, Boston, MA, USA, (2001).
  8. Jackson, M.A.: The Problem Frames Approach to Software Engineering, in Proc. APSEC 2007, 14th Asia-Pacific Software Engineering Conference, (2007)
  9. Korabik R. M.: A New Approach to Operational Efficiency for Chronic Renal Dialysis, Winter Simulation Conference I.E.E.E, Highland, pp 659-662, (1978).
  10. Leveson, N.: Medical Devices: The Therac-25, appendix in the book Safeware: System Safety and Computers, Addison-Wesley, Boston, MA, USA (1995). Site: http://sunnyday.mit.edu/papers/therac.pdf
  11. Roux, O., D. Duvivier, E. Ramat, G. Quesnel, C. Combes: UML-Statechart Modeling Tool For the VLE Simulator: AnApplication To A Chronic Renal Dialysis Unit,” 8th International Conference of Modeling and Simulation - MOSIM'10 - May 10-12, 2010 - Hammamet - Tunisia, “Evaluation and optimization of innovative production systems of goods and services.”, (2010).
  12. Sindre G. and Opdahl, A. L.: Eliciting security requirements with misuse cases, Requirements Eng. Vol. 10, pp. 34-44, (2005).

Paper Citation

in Harvard Style

Gallant R. and Goldin L. (2013). Overcoming Software System Misuse by Domain Knowledge . In Proceedings of the 4th International Workshop on Software Knowledge - Volume 1: SKY, (IC3K 2013) ISBN 978-989-8565-76-1, pages 62-69. DOI: 10.5220/0004641700620069

in Bibtex Style

author={Reuven Gallant and Leah Goldin},
title={Overcoming Software System Misuse by Domain Knowledge},
booktitle={Proceedings of the 4th International Workshop on Software Knowledge - Volume 1: SKY, (IC3K 2013)},

in EndNote Style

JO - Proceedings of the 4th International Workshop on Software Knowledge - Volume 1: SKY, (IC3K 2013)
TI - Overcoming Software System Misuse by Domain Knowledge
SN - 978-989-8565-76-1
AU - Gallant R.
AU - Goldin L.
PY - 2013
SP - 62
EP - 69
DO - 10.5220/0004641700620069