editors, Computer Aided Verification, pages 359–364,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Dwyer, M. B., Avrunin, G. S., and Corbett, J. C. (1999).
Patterns in property specifications for finite-state ver-
ification. In Proceedings of the 1999 International
Conference on Software Engineering (IEEE Cat.
No.99CB37002), pages 411–420.
ENISA (2017). Baseline security recommendations for
iot in the context of critical information infrastruc-
tures, https://www.enisa.europa.eu/publications/base
line-security-recommendations-for-iot, technical re-
port.
ETSI (2015). Methods for testing & specification; risk-
based security assessment and testing methodologies,
https://www.etsi.org/, technical report.
Ge, M., Hong, J. B., Guttmann, W., and Kim, D. S. (2017).
A framework for automating security analysis of the
internet of things. Journal of Network and Computer
Applications, 83:12 – 27.
Groz, R., Li, K., Petrenko, A., and Shahbaz, M. (2008).
Modular system verification by inference, testing and
reachability analysis. In Suzuki, K., Higashino, T.,
Ulrich, A., and Hasegawa, T., editors, Testing of Soft-
ware and Communicating Systems, pages 216–233,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Gutirrez-Madro ˜nal, L., La Blunda, L., Wagner, M. F., and
Medina-Bulo, I. (2019). Test event generation for
a fall-detection iot system. IEEE Internet of Things
Journal, 6(4):6642–6651.
Holzmann, G. (2011). The SPIN Model Checker: Primer
and Reference Manual. Addison-Wesley Professional,
1st edition.
Khan, M. A. and Salah, K. (2018). Iot security: Review,
blockchain solutions, and open challenges. Future
Generation Computer Systems, 82:395 – 411.
Lally, G. and Sgandurra, D. (2018). Towards a framework
for testing the security of iot devices consistently. In
Saracino, A. and Mori, P., editors, Emerging Tech-
nologies for Authorization and Authentication, pages
88–102, Cham. Springer International Publishing.
Maksymyuk, T., Dumych, S., Brych, M., Satria, D., and Jo,
M. (2017). An iot based monitoring framework for
software defined 5g mobile networks. In Proceedings
of the 11th International Conference on Ubiquitous
Information Management and Communication, IM-
COM17, New York, NY, USA. Association for Com-
puting Machinery.
Mariani, L. and Pastore, F. (2008). Automated identification
of failure causes in system logs. In Software Reliabil-
ity Engineering, 2008. ISSRE 2008. 19th International
Symposium on, pages 117–126.
Matheu Garcia, S. N., Hernndez-Ramos, J., and Skarmeta,
A. (2019). Toward a cybersecurity certification frame-
work for the internet of things. IEEE Security & Pri-
vacy, 17:66–76.
Matheu-Garc
´
ıa, S. N., Ramos, J. L. H., G
´
omez-Skarmeta,
A. F., and Baldini, G. (2019). Risk-based automated
assessment and testing for the cybersecurity certifica-
tion and labelling of iot devices. Computer Standards
& Interfaces, 62:64–83.
Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., and Rah-
man, M. A. (2016). Iotsat: A formal framework for
security analysis of the internet of things (iot). In
2016 IEEE Conference on Communications and Net-
work Security (CNS), pages 180–188.
Nadir, I., Ahmad, Z., Mahmood, H., Shah, G., Shahzad, F.,
Mujahid, M., Khan, H., and Gulzar, U. (2019). An au-
diting framework for vulnerability analysis of iot sys-
tem. pages 39–47.
NIST (2018). Framework for improving critical infrastruc-
ture cybersecurity, version 1.1, https://doi.org/10.6028
OWASP (2003). Owasp testing guide v3.0 project,
http://www.owasp.org/index.php/category:
owasp testing project#owasp testing guide v3.
Petrenko, A. and Avellaneda, F. (2019). Learning commu-
nicating state machines. In Tests and Proofs - 13th
International Conference, TAP 2019, Held as Part of
the Third World Congress on Formal Methods 2019,
Porto, Portugal, October 9-11, 2019, Proceedings,
pages 112–128.
”Red-Hat-Software” (2020). The business rule management
system drools, https://www.drools.org/, march 2020.
Salva, S. and Blot, E. (2019). Reverse engineering be-
havioural models of iot devices. In 31st International
Conference on Software Engineering & Knowledge
Engineering (SEKE), Lisbon, Portugal.
Salva, S. and Blot, E. (2020a). Cktail: Model learning
of communicating systems. In Proceedings of the
15th International Conference on Evaluation of Novel
Approaches to Software Engineering, ENASE 2020,
Prague, CZECH REPUBLIC, May 5-6, 2020.
Salva, S. and Blot, E. (2020b). Verifying the application of
security measures in iot software systems with model
learning, companion site. (Date last accessed march
2020).
Siby, S., Maiti, R. R., and Tippenhauer, N. O. (2017).
Iotscanner: Detecting and classifying privacy threats
in iot neighborhoods. CoRR, abs/1701.05007.
Tappler, M., Aichernig, B. K., and Bloem, R. (2017).
Model-based testing iot communication via active au-
tomata learning. In 2017 IEEE International Confer-
ence on Software Testing, Verification and Validation
(ICST), pages 276–287.
Wilson, J., Wahby, R., Corrigan-Gibbs, H., Boneh, D.,
Levis, P., and Winstein, K. (2017). Trust but verify:
Auditing the secure internet of things. pages 464–474.
Zhang, Z.-K., Cho, M. C. Y., and Shieh, S. (2015). Emerg-
ing security threats and countermeasures in iot. In
Proceedings of the 10th ACM Symposium on Informa-
tion, Computer and Communications Security, ASIA
CCS15, pages 1–6, New York, NY, USA. Association
for Computing Machinery.
ICSOFT 2020 - 15th International Conference on Software Technologies
360