Learning i/o automata

F Aarts, F Vaandrager - International Conference on Concurrency Theory, 2010 - Springer
Links are established between three widely used modeling frameworks for reactive systems:
the ioco theory of Tretmans, the interface automata of De Alfaro and Henzinger, and Mealy …

Model learning and model-based testing

BK Aichernig, W Mostowski, MR Mousavi… - Machine Learning for …, 2018 - Springer
We present a survey of the recent research efforts in integrating model learning with model-
based testing. We distinguished two strands of work in this domain, namely test-based …

Inference and abstraction of the biometric passport

F Aarts, J Schmaltz, F Vaandrager - International Symposium On …, 2010 - Springer
Abstract Model-based testing is a promising software testing technique for the automation of
test generation and test execution. One obstacle to its adoption is the difficulty of develo** …

JTorX: A tool for on-line model-driven test derivation and execution

A Belinfante - International Conference on Tools and Algorithms for …, 2010 - Springer
We introduce JTorX, a tool for model-driven test derivation and execution, based on the ioco
theory. This theory, originally presented in [12], has been refined in [13] with test-cases that …

Model-based testing and some steps towards test-based modelling

J Tretmans - Formal Methods for Eternal Networked Software …, 2011 - Springer
Abstract Model-based testing is one of the promising technologies to increase the efficiency
and effectiveness of software testing. In model-based testing, a model specifies the required …

Improving active Mealy machine learning for protocol conformance testing

F Aarts, H Kuppens, J Tretmans, F Vaandrager… - Machine learning, 2014 - Springer
Using a well-known industrial case study from the verification literature, the bounded
retransmission protocol, we show how active learning can be used to establish the …

[PDF][PDF] Tomte: bridging the gap between active learning and real-world systems

FD Aarts - 2014 - repository.ubn.ru.nl
1 Introduction stakeholders like customers, product managers, designers, developers and
users of the application domain. Moreover, models facilitate verification and validation …

Model-based testing

M Timmer, E Brinksma… - Software and systems …, 2011 - ebooks.iospress.nl
This paper provides a comprehensive introduction to a framework for formal testing using
labelled transition systems, based on an extension and reformulation of the ioco theory …

Learning and testing the bounded retransmission protocol

F Aarts, H Kuppens, J Tretmans… - International …, 2012 - proceedings.mlr.press
Using a well-known industrial case study from the verification literature, the bounded
retransmission protocol, we show how active learning can be used to establish the …

Protocol state machines and session languages: specification, implementation, and security flaws

E Poll, J De Ruiter, A Schubert - 2015 IEEE Security and …, 2015 - ieeexplore.ieee.org
Input languages, which describe the set of valid inputs an application has to handle, play a
central role in language-theoretic security, in recognition of the fact that overly complex …