2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) 2014
DOI: 10.1109/csmr-wcre.2014.6747207
|View full text |Cite
|
Sign up to set email alerts
|

Model inference and security testing in the spacios project

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The hW -inference method was implemented in the SIMPA 2 model inference framework (Büchler et al, 2014), which already included implementations of the algorithms by Rivest & Schapire and LocW, as well as various other algorithms for resettable systems. All experiments with SIMPA have been performed on a desktop computer with an Intel R Xeon R E3-1246 v3 processor, 3.50 GHz and 32 GB of RAM.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The hW -inference method was implemented in the SIMPA 2 model inference framework (Büchler et al, 2014), which already included implementations of the algorithms by Rivest & Schapire and LocW, as well as various other algorithms for resettable systems. All experiments with SIMPA have been performed on a desktop computer with an Intel R Xeon R E3-1246 v3 processor, 3.50 GHz and 32 GB of RAM.…”
Section: Methodsmentioning
confidence: 99%
“…Model learning from a black box has received growing interest in software engineering to retrieve models of legacy software systems or components for various purposes, such as documentation as in "specification mining" (Ammons et al, 2002), verification with model checkers (Peled et al, 1999), security analysis (Büchler et al, 2014) etc. For reactive systems, the resulting models are in general input/output transition systems, or, if inputs and outputs alternate synchronously, Mealy machines, often called Finite State Machines (FSMs).…”
Section: Introductionmentioning
confidence: 99%
“…We only came across this technique recently, but it has been used for security analyses by others before, e.g. to analyse botnets [26] and more recently web applications [27].…”
Section: Implementationsmentioning
confidence: 99%
“…We first augmented the implementation of hW -inference in SIMPA 1 . SIMPA is a recursive acronym for "SIMPA Infers Model Pretty Automatically" introduced by Büchler et al (2014) and has been used in different projects since it is a model inference framework that provides implementations for various algorithms, including hW -inference (GROZ et al, 2020).…”
Section: Case Studymentioning
confidence: 99%