Model transformation testing and debugging: A survey

J Troya, S Segura, L Burgueño, M Wimmer - ACM Computing Surveys, 2022 - dl.acm.org
Model transformations are the key technique in Model-Driven Engineering (MDE) to
manipulate and construct models. As a consequence, the correctness of software systems …

A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study

C Braghin, M Lilli, E Riccobene - Computers & Security, 2023 - Elsevier
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …

A journey with ASMETA from requirements to code: application to an automotive system with adaptive features

P Arcaini, S Bonfanti, A Gargantini, E Riccobene… - International Journal on …, 2024 - Springer
Modern automotive systems with adaptive control features require rigorous analysis to
guarantee correct operation. We report our experience in modeling the automotive case …

The ASMETA approach to safety assurance of software systems

P Arcaini, A Bombarda, S Bonfanti, A Gargantini… - Logic, Computation and …, 2021 - Springer
Safety-critical systems require development methods and processes that lead to provably
correct systems in order to prevent catastrophic consequences due to system failure or …

Validation obligations: a novel approach to check compliance between requirements and their formal specification

A Mashkoor, M Leuschel… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Traditionally, practitioners use formal methods pre-dominately for one half of the quality-
assurance process: verification (do we build the software right?). The other half-validation …

Validation of formal models by timed probabilistic simulation

F Vu, M Leuschel, A Mashkoor - International Conference on Rigorous …, 2021 - Springer
The validation of a formal model consists of checking its conformance with actual
requirements. In the context of (Event-) B, some temporal aspects can typically be validated …

[PDF][PDF] Formal Proof of a Vulnerability in Z-Wave IoT Protocol.

M Lilli, C Braghin, E Riccobene - SECRYPT, 2021 - scitepress.org
Nowadays, IoT (Internet of Things) devices are becoming part of our daily life. Unfortunately,
many of them do not use standardized communication protocols with a provable security …

Developing a prototype of a mechanical ventilator controller from requirements to code with ASMETA

A Bombarda, S Bonfanti, A Gargantini… - arXiv preprint arXiv …, 2021 - arxiv.org
Rigorous development processes aim to be effective in developing critical systems,
especially if failures can have catastrophic consequences for humans and the environment …

RRGcode: Deep hierarchical search-based code generation

Q Gou, Y Dong, Y Wu, Q Ke - Journal of Systems and Software, 2024 - Elsevier
Retrieval-augmented code generation strengthens the generation model by using a retrieval
model to select relevant code snippets from a code corpus. The synergy between retrieval …

[HTML][HTML] Parameter-driven generation of evaluation program for a neuroevolution algorithm on a binary multiplexer example

AY Doroshenko, IZ Achour… - … Computer Science, Control, 2023 - ric.zntu.edu.ua
Context. The problem of automated development of evaluation programs for the
neuroevolution of augmenting topologies. Neuroevolution algorithms apply mechanisms of …