软件控制等级军事标准
Military standard on software control levels

原始链接: https://entropicthoughts.com/mil-std-882e-software-control

MIL-STD-882E 根据潜在危险定义软件控制等级,本质上将风险划分为四个层级。 最高风险涉及对关键功能具有*直接、立即*控制权的软件,错误会导致即时损害。 其次是具有*延迟*后果的直接控制场景,或软件提示*立即人工干预*以避免危险的情况。较低的风险存在于软件*建议*操作时,允许有时间进行独立验证。 最后,最低风险适用于仅用于辅助任务的软件,不控制关键系统。 随着人工智能(如LLM和计算机视觉)的进步,软件越来越多地融入以前由人类主导的流程,因此该标准如今尤其重要,需要仔细考虑潜在的安全影响和适当的控制等级。

## 黑客新闻讨论:军事标准与软件质量 最近黑客新闻上的一场讨论围绕着军事标准(如MIL-STD-882E)对提高软件质量的价值。核心观点是,仅仅采用安全关键型开发的流程和工具并不是关键——**深入理解软件在整个系统中的作用才是。** 许多评论者同意,90%的质量提升来自于深思熟虑的设计,而非僵化的方法论。 对话强调了一个常见陷阱:仅仅关注潜在的*故障*,而不是全面分析软件与世界的交互以及潜在的设计错误。一些人指出组件“失效”与“设计不足以满足其目的”之间的区别。 几位用户强调,标准最有价值之处在于正确评估项目风险并分配适当的资源,尽管现实并非总是如此。另一些人建议采用替代的 критичность 分类,例如Alistair Cockburn的分类,作为一种更实用的方法。最终,共识倾向于优先考虑彻底的理解和系统层面的思考,而不是盲目地遵循“最佳实践”。
相关文章

原文

The mil-std-882e standard specifies levels of software control, i.e. how dangerous the software can be based on what it is responsible for. Although the standard is a little more complicated, we can simplify to essentially four levels:

  1. The most alarming case is when the software has direct control of something that can be immediately dangerous if the software does the wrong thing.
  2. Still dangerous, but slightly less so is either (a) when the software has direct control, but there is a delay between when it does the wrong thing and when it becomes dangerous; or (b) when the software is not directly in control, but a human must immediately react to software signals and perform an action to prevent danger.1 E.g. the software commands a reactor shutdown when there are only seconds remaining until the reactor blows up.
  3. Yet less dangerous is when the software is not in direct control, and there is time to verify its suggestion against independent methods to make sure the action recommended by the software is indeed appropriate.
  4. The least dangerous is when software only has an auxiliary use and is not involved in controlling something serious.

I thought this was a neat way to look at things, and particularly salient now that llms and computer vision have blown open new opportunities for injecting software into processes in which software were previously subservient to humans.

联系我们 contact @ memedata.com