Dadeau, F., H
´
eam, P.-C., and Kheddam, R. (2011).
Mutation-based test generation from security proto-
cols in HLPSL. In Software Testing, Verification and
Validation, 2011 IEEE Fourth Int. Conf. on, pages
240–248. IEEE.
De Rubertis, A., Mainetti, L., Mighali, V., Patrono, L.,
Sergi, I., Stefanizzi, M. L., and Pascali, S. (2013). Per-
formance evaluation of end-to-end security protocols
in an Internet of Things. In Software, Telecommunica-
tions and Computer Networks (SoftCOM), 2013 21st
Int. Conf. on, pages 1–6. IEEE.
Eclipse Paho Team (2018). Eclipse Paho—MQTT and
MQTT-SN software. http://www.eclipse.org/
paho/.
Grabowski, J., Hogrefe, D., R
´
ethy, G., Schieferdecker, I.,
Wiles, A., and Willcock, C. (2003). An introduction to
the testing and test control notation (TTCN-3). Com-
puter Networks, 42(3):375–403.
Heckel, R. and Torrini, P. (2010). Stochastic modelling and
simulation of mobile systems. In Graph transforma-
tions and model-driven engineering, pages 87–101.
Springer.
Houimli, M., Kahloul, L., and Benaoun, S. (2017). Formal
specification, verification and evaluation of the MQTT
protocol in the internet of things. In Mathematics and
Information Technology (ICMIT), 2017 Int. Conf. on,
pages 214–221. IEEE.
Hsu, Y., Shu, G., and Lee, D. (2008). A model-based ap-
proach to security flaw detection of network protocol
implementations. In Network Protocols, 2008. ICNP
2008. IEEE Int. Conf. on, pages 114–123. IEEE.
Hsueh, M., Tsai, T. K., and Iyer, R. K. (1997). Fault injec-
tion techniques and tools. IEEE Computer, 30(4):75–
82.
Jia, Y. and Harman, M. (2011). An analysis and survey of
the development of mutation testing. IEEE transac-
tions on software engineering, 37(5):649–678.
Jing, C., Wang, Z., Shi, X., Yin, X., and Wu, J. (2008).
Mutation testing of protocol messages based on ex-
tended TTCN-3. In Advanced Information Network-
ing and Applications, 22nd Int. Conf. on, pages 667–
674. IEEE.
Khan, A., Torrini, P., and Heckel, R. (2009). Model-
based simulation of voip network reconfigurations us-
ing graph transformation systems. Electronic Commu-
nications of the EASST, 16.
Kingsbury, K. (2018). Distributed systems safety research.
http://jepsen.io.
Kosiuczenko, P. and Lajios, G. (2007). Simulation of gen-
eralised semi-markov processes based on graph trans-
formation systems. Electronic Notes in Theoretical
Computer Science, 175(4):73–86.
Kwiatkowska, M., Norman, G., and Parker, D. (2011).
PRISM 4.0: Verification of probabilistic real-time sys-
tems. In Int. Conf. on Computer Aided Verification,
pages 585–591. Springer.
Kwiatkowska, M., Norman, G., and Sproston, J. (2002).
Probabilistic model checking of the IEEE 802.11
wireless local area network protocol. In Process Al-
gebra and Probabilistic Methods: Performance Mod-
eling and Verification, pages 169–187. Springer.
Lee, S., Kim, H., Hong, D., and Ju, H. (2013). Correlation
analysis of MQTT loss and delay according to QoS
level. In The Int. Conf. on Information Networking,
pages 714–717. IEEE Computer Society.
Light, R. A. (2017). Mosquitto: server and client imple-
mentation of the MQTT protocol. Journal of Open
Source Software, 2(13).
Mikk, E., Lakhnech, Y., Petersohn, C., and Siegel, M.
(1997). On formal semantics of statecharts as sup-
ported by STATEMATE. In Workshop, Ilkley, vol-
ume 14, page 15.
Mladenov, K., van Winsen, S., and Mavrakis, C. (2017).
Formal verification of the implementation of the
MQTT protocol in IoT devices. SNE Master Research
Projects 2016–2017.
Nilsson, R. (2015). ScalaCheck. https://www.
scalacheck.org/.
Odersky, M., Spoon, L., and Venners, B. (2008). Program-
ming in Scala. Artima Inc.
Oehlert, P. (2005). Violating assumptions with fuzzing.
IEEE Security & Privacy, 3(2):58–62.
Park, J.-C. and Miller, R. E. (1997). Synthesizing proto-
col specifications from service specifications in timed
extended finite state machines. In Distributed Com-
puting Systems, 1997., Proc. of the 17th Int. Conf. on,
pages 253–260. IEEE.
Paz, A. (1971). Introduction to Probabilistic automata.
Academic Press, 1 edition.
Stott, D. T., Ries, G. L., Hsueh, M., and Iyer, R. K. (1998).
Dependability analysis of a high-speed network using
software-implemented fault injection and simulated
fault injection. IEEE Trans. Computers, 47(1):108–
119.
Tappler, M., Aichernig, B., and Bloem, R. (2017). Model-
based testing IoT communication via active automata
learning. In 10th IEEE Int. Conf. on Software Testing,
Verification and Validation, pages 276–287. IEEE.
Testware (2018). Project IoT. http://www.iot-t.de/en/
testware/.
Thangavel, D., Ma, X., Valera, A. C., Tan, H., and Tan,
C. K. (2014). Performance evaluation of MQTT and
coap via a common middleware. In 2014 IEEE Ninth
Int. Conf. on Intelligent Sensors, Sensor Networks and
Information Processing, pages 1–6. IEEE.
Torrini, P., Heckel, R., and R
´
ath, I. (2010). Stochastic sim-
ulation of graph transformation systems. In Int. Conf.
on Fundamental Approaches to Software Engineer-
ing, pages 154–157. Springer.
Utting, M., Pretschner, A., and Legeard, B. (2012). A
taxonomy of model-based testing approaches. Softw.
Test., Verif. Reliab., 22(5):297–312.
Veanes, M., Campbell, C., Grieskamp, W., Schulte, W.,
Tillmann, N., and Nachmanson, L. (2008). Model-
based testing of object-oriented reactive systems with
Spec Explorer. In Formal Methods and Testing 2008,
volume 4949 of LNCS, pages 39–76. Springer.
ENASE 2019 - 14th International Conference on Evaluation of Novel Approaches to Software Engineering
208