{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T04:31:48Z","timestamp":1719549108198},"reference-count":142,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1016\/bs.adcom.2015.11.004","type":"book-chapter","created":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T20:35:30Z","timestamp":1452717330000},"page":"53-120","source":"Crossref","is-referenced-by-count":24,"title":["Recent Advances in Model-Based Testing"],"prefix":"10.1016","author":[{"given":"Mark","family":"Utting","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Legeard","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Bouquet","sequence":"additional","affiliation":[]},{"given":"Elizabeta","family":"Fourneret","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Peureux","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Vernotte","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/bs.adcom.2015.11.004_bb0010","series-title":"A Practitioner's Guide to Software Test Design","author":"Lee","year":"2004"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0015","series-title":"Global Software Test Automation: A Discussion of Software Testing for Executives","author":"Hung","year":"2006"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0020","series-title":"Proceedings of the 27th International Conference on Software Engineering, ICSE \u201905, St. Louis, MO, USA","isbn-type":"print","first-page":"392","article-title":"One evaluation of model-based testing and its automation","author":"Pretschner","year":"2005","ISBN":"http:\/\/id.crossref.org\/isbn\/1581139632"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0025","series-title":"Practical Model-Based Testing\u2014A Tools Approach","isbn-type":"print","author":"Utting","year":"2006","ISBN":"http:\/\/id.crossref.org\/isbn\/0123725011"},{"issue":"5","key":"10.1016\/bs.adcom.2015.11.004_bb0030","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1002\/stvr.456","article-title":"A taxonomy of model-based testing approaches","volume":"22","author":"Mark","year":"2012","journal-title":"Softw. Test. Verif. Rel.","ISSN":"http:\/\/id.crossref.org\/issn\/1099-1689","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0035","series-title":"A Craftsman's Approach","author":"Jorgensen","year":"2009"},{"issue":"3","key":"10.1016\/bs.adcom.2015.11.004_bb0040","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TSE.1978.231496","article-title":"Testing software design modeled by finite-state machines","volume":"4","author":"Chow","year":"1978","journal-title":"IEEE Trans. Softw. Eng.","ISSN":"http:\/\/id.crossref.org\/issn\/0098-5589","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0045","unstructured":"Pairwise web site at http:\/\/www.pairwise.org\/, 2015"},{"issue":"1","key":"10.1016\/bs.adcom.2015.11.004_bb0050","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1002\/stvr.427","article-title":"Model-based quality assurance of protocol documentation: tools and methodology","volume":"21","author":"Wolfgang","year":"2011","journal-title":"Softw. Test. Verif. Rel.","ISSN":"http:\/\/id.crossref.org\/issn\/1099-1689","issn-type":"print"},{"issue":"2","key":"10.1016\/bs.adcom.2015.11.004_bb0055","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/2697399","article-title":"Model-based testing: where does it stand?","volume":"58","author":"Binder","year":"2015","journal-title":"Commun. ACM","ISSN":"http:\/\/id.crossref.org\/issn\/0001-0782","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0060","isbn-type":"print","first-page":"34","article-title":"Contract-based testing","volume":"vol. 2757","author":"Aichernig","year":"2003","ISBN":"http:\/\/id.crossref.org\/isbn\/3540205276"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0065","series-title":"ACSL: ANSI\/ISO C specification language version 1.7","author":"Baudin","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0070","first-page":"49","article-title":"The Spec# programming system: an overview","author":"Barnett","year":"2004"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0075","series-title":"NModel, online 2006","author":"Jacky","year":"2015"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0080","isbn-type":"print","first-page":"231","article-title":"A simple and practical approach to unit testing: the JML and JUnit way","author":"Cheon","year":"2002","ISBN":"http:\/\/id.crossref.org\/isbn\/3540437592"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0085","series-title":"Formal Verification of Object-Oriented Software, Lecture Notes in Computer Science","first-page":"183","article-title":"JMLUnit: the next generation","volume":"vol. 6528","author":"Zimmerman","year":"2010"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0090","series-title":"Behavioral Specifications of Businesses and Systems","first-page":"175","article-title":"JML: a notation for detailed design","author":"Leavens","year":"1999"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0095","series-title":"ICSE (1)","first-page":"225","article-title":"Test generation through programming in UDITA","author":"Gligoric","year":"2010"},{"issue":"2","key":"10.1016\/bs.adcom.2015.11.004_bb0100","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/A:1022920129859","article-title":"Model checking programs","volume":"10","author":"Visser","year":"2003","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"10.1016\/bs.adcom.2015.11.004_bb0105","first-page":"1","article-title":"JSConTest: contract-driven testing and path effect inference for JavaScript","volume":"11","author":"Heidegger","year":"2012","journal-title":"J. Obj. Technol."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0110","series-title":"Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, San Jose, CA, USA","isbn-type":"print","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1145\/2610384.2631832","article-title":"Effective test generation and adequacy assessment for javascript-based web applications","author":"Mirshokraie","year":"2014","ISBN":"http:\/\/id.crossref.org\/isbn\/9781450326452"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0115","series-title":"ICTSS","first-page":"64","article-title":"Praspel: a specification language for contract-based testing in PHP","author":"Enderlin","year":"2011"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0120","series-title":"Proceedings of the 8th Conference on Quality Engineering in Software Technology (CONQUEST), Nuremberg, Germany","first-page":"181","article-title":"The UML 2.0 testing profile","author":"Baker","year":"2004"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0125","series-title":"Testing of Communicating Systems","isbn-type":"print","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-540-24704-3_3","article-title":"From design to test with UML","volume":"vol. 2978","author":"Dai","year":"2004","ISBN":"http:\/\/id.crossref.org\/isbn\/9783540212195"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0130","series-title":"Technology Systems and Management","isbn-type":"print","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-642-20209-4_9","article-title":"Construction of test cases from UML models","volume":"vol. 145","author":"Sawant","year":"2011","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642202087"},{"issue":"7","key":"10.1016\/bs.adcom.2015.11.004_bb0135","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1002\/stvr.1537","article-title":"Test generation with satisfiability modulo theories solvers in model-based testing","volume":"24","author":"Cantenot","year":"2014","journal-title":"Softw. Test. Verif. Rel.","ISSN":"http:\/\/id.crossref.org\/issn\/1099-1689","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0140","series-title":"Modelling Foundations and Applications","isbn-type":"print","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-642-21470-7_9","article-title":"Automated transition from use cases to UML state machines to support state-based testing","volume":"vol. 6698","author":"Yue","year":"2011","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642214691"},{"issue":"3","key":"10.1016\/bs.adcom.2015.11.004_bb0145","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s00165-012-0258-z","article-title":"Test generation from state based use case models","volume":"26","author":"Nogueira","year":"2014","journal-title":"Form. Asp. Comput.","ISSN":"http:\/\/id.crossref.org\/issn\/0934-5043","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0150","series-title":"Integrated Formal Methods","isbn-type":"print","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/978-3-540-24756-2_26","article-title":"Using UML sequence diagrams as the basis for a formal test description language","volume":"vol. 2999","author":"Pickin","year":"2004","ISBN":"http:\/\/id.crossref.org\/isbn\/9783540213772"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0155","series-title":"Fundamental Approaches to Software Engineering","isbn-type":"print","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-540-31984-9_22","article-title":"Coverage criteria for testing of object interactions in sequence diagrams","volume":"vol. 3442","author":"Rountev","year":"2005","ISBN":"http:\/\/id.crossref.org\/isbn\/9783540254201"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0160","series-title":"Proceedings of International Conference on Advances in Computing","isbn-type":"print","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-81-322-0740-5_16","article-title":"Test case generation using activity diagram and sequence diagram","volume":"vol. 174","author":"Tripathy","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9788132207399"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0165","isbn-type":"print","first-page":"277","article-title":"Automatic Test Case Generation Using Sequence Diagram","author":"Panthi","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9788132207399"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0170","series-title":"Global Trends in Information Systems and Software Applications","isbn-type":"print","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-642-29216-3_23","article-title":"Interaction diagram based test case generation","volume":"vol. 270","author":"Kumar","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642292156"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0175","series-title":"Intelligent Computing, Communication and Devices","isbn-type":"print","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-81-322-2012-1_13","article-title":"Test case creation from UML sequence diagram: a soft computing approach","volume":"vol. 308","author":"Jena","year":"2015","ISBN":"http:\/\/id.crossref.org\/isbn\/9788132220114"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0180","series-title":"Business Process Management","isbn-type":"print","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-642-15618-2_6","article-title":"BPM in practice: who is doing what?","volume":"vol. 6336","author":"Reijers","year":"2010","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642156175"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0185","series-title":"Test Generation from Business Rules","author":"Jensen","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0190","series-title":"Software Quality and Software Testing in Internet Times","isbn-type":"print","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-642-56333-1_17","article-title":"Automated testing of mySAP business processes","author":"Mecke","year":"2002","ISBN":"http:\/\/id.crossref.org\/isbn\/9783540426325"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0195","series-title":"Business Process Management Workshops","isbn-type":"print","first-page":"603","article-title":"Business process-based testing of web applications","volume":"vol. 66","author":"Andreas","year":"2011","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642205101"},{"issue":"8","key":"10.1016\/bs.adcom.2015.11.004_bb0200","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","article-title":"An orchestrated survey of methodologies for automated software test case generation","volume":"86","author":"Anand","year":"2013","journal-title":"J. Syst. Softw.","ISSN":"http:\/\/id.crossref.org\/issn\/0164-1212","issn-type":"print"},{"issue":"3","key":"10.1016\/bs.adcom.2015.11.004_bb0205","doi-asserted-by":"crossref","DOI":"10.4304\/jsw.9.3.589-595","article-title":"Test case generation of web service composition based on CP-nets","volume":"9","author":"Wang","year":"2014","journal-title":"J. Softw."},{"issue":"4","key":"10.1016\/bs.adcom.2015.11.004_bb0210","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSE.2010.50","article-title":"GUI interaction testing: incorporating event context","volume":"37","author":"Yuan","year":"2011","journal-title":"IEEE Trans. Softw. Eng.g","ISSN":"http:\/\/id.crossref.org\/issn\/0098-5589","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0215","series-title":"20th Working Conference on Reverse Engineering (WCRE), 2013","first-page":"11","article-title":"The first decade of GUI ripping: extensions, applications, and broader impacts","author":"Memon","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0220","series-title":"GUITAR","author":"Memon","year":"2015"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0225","series-title":"Companion of the 30th International Conference on Software Engineering, ICSE Companion \u201908, Leipzig, Germany","isbn-type":"print","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1145\/1370175.1370207","article-title":"Test case generator for GUITAR","author":"Hackner","year":"2008","ISBN":"http:\/\/id.crossref.org\/isbn\/9781605580791"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0230","series-title":"Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2012, Essen, Germany","isbn-type":"print","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1145\/2351676.2351717","article-title":"Using GUI ripping for automated testing of android applications","author":"Amalfitano","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9781450312042"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0235","series-title":"Testing Software and Systems","isbn-type":"print","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-642-34691-0_18","article-title":"Parameterized GUI Tests","volume":"vol. 7641","author":"Arlt","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642346903"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0240","series-title":"23rd IEEE International Symposium on Software Reliability Engineering (ISSRE), 2012","first-page":"301","article-title":"Lightweight static analysis for GUI testing","author":"Arlt","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0245","series-title":"34th International Conference on Software Engineering (ICSE), 2012","first-page":"1423","article-title":"EXSYST: Search-based GUI testing","author":"Gross","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0250","series-title":"24th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2013","first-page":"288","article-title":"A pattern-based approach for GUI modeling and testing","author":"Moreira","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0255","series-title":"23rd IEEE International Symposium on Software Reliability Engineering (ISSRE), 2012","first-page":"251","article-title":"AutoInSpec: using missing test coverage to improve specifications in GUIs","author":"Cohen","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0260","series-title":"Current Trends in Web Engineering","isbn-type":"print","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-642-35623-0_7","article-title":"Model-driven testing for web applications using abstract state machines","volume":"vol. 7703","author":"Bolis","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642356223"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0265","series-title":"IEEE International Conference on Software Testing, Verification and Validation (ICST 2015)","first-page":"1","article-title":"Classifying and qualifying GUI defects","author":"Lelli","year":"2015"},{"issue":"11","key":"10.1016\/bs.adcom.2015.11.004_bb0270","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1016\/j.infsof.2009.06.012","article-title":"Advancing test automation technology to meet the challenges of model-based software testing","volume":"51","author":"Zhu","year":"2009","journal-title":"J. Inform. Softw. Technol."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0275","series-title":"Implementing Automated Software Testing: How to Save Time and Lower Costs While Raising Quality","isbn-type":"print","author":"Dustin","year":"2009","ISBN":"http:\/\/id.crossref.org\/isbn\/0321580516"},{"issue":"11","key":"10.1016\/bs.adcom.2015.11.004_bb0280","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1002\/spe.540","article-title":"The directed Chinese postman problem","volume":"33","author":"Thimbleby","year":"2003","journal-title":"Soft. Pract. Exp."},{"issue":"7","key":"10.1016\/bs.adcom.2015.11.004_bb0285","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1145\/368273.368557","article-title":"A machine program for theorem-proving","volume":"5","author":"Davis","year":"1962","journal-title":"Commun. ACM"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0290","first-page":"337","article-title":"Z3: an efficient SMT solver","author":"de Moura","year":"2008"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0295","series-title":"19th International Conference on Computer Aided Verification (CAV\u201907), Berlin, Germany","first-page":"298","article-title":"CVC3","author":"Barrett","year":"2007"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0300","first-page":"171","article-title":"CVC4","author":"Barrett","year":"2011"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0305","first-page":"737","article-title":"Yices 2.2","volume":"vol. 8559","author":"Dutertre","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0310","first-page":"93","article-title":"The MathSAT5 SMT Solver","author":"Cimatti","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0315","first-page":"134","article-title":"Pex white box test generation for .NET","volume":"vol. 4966","author":"Tillmann","year":"2008"},{"issue":"7","key":"10.1016\/bs.adcom.2015.11.004_bb0320","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1002\/stvr.1537","article-title":"Test generation with SMT solvers in model-based testing","volume":"24","author":"Cantenot","year":"2014","journal-title":"STVR, Softw. Test. Verif. Rel."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0325","series-title":"26th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201911)","first-page":"388","article-title":"Optimizing the automatic test generation by SAT and SMT solving for Boolean expressions","author":"Arcaini","year":"2011"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0330","first-page":"28","article-title":"Applying SMT solvers to the test template framework","author":"Cristi\u00e1","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0335","first-page":"229","article-title":"{log} as a test case generator for the test template framework","author":"Cristi\u00e1","year":"2013"},{"issue":"1","key":"10.1016\/bs.adcom.2015.11.004_bb0340","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/0004-3702(77)90007-8","article-title":"Consistency in networks of relations","volume":"8","author":"Macworth","year":"1977","journal-title":"J. Artif. Intell."},{"issue":"4","key":"10.1016\/bs.adcom.2015.11.004_bb0345","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1145\/321296.321300","article-title":"Backtrack programming","volume":"12","author":"Golomb","year":"1965","journal-title":"J. ACM"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0350","series-title":"Nat. Conf. on Artificial Intelligence (AAAI\u201986)","first-page":"759","article-title":"Domains in logic programming","author":"van Hentenryck","year":"1986"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0355","series-title":"Foundations of constraint satisfaction. Computation in cognitive science","isbn-type":"print","author":"Tsang","year":"1993","ISBN":"http:\/\/id.crossref.org\/isbn\/9780127016108"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0360","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.infsof.2014.09.009","article-title":"Testing robot controllers using constraint programming and continuous integration","volume":"57","author":"Mossige","year":"2015","journal-title":"Inform. Softw. Technol."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0365","series-title":"9th International Symposium on Programming Languages: Implementations, Logics, and Programs (PLILP\u201997)","first-page":"191","article-title":"An open-ended finite domain constraint solver","author":"Carlsson","year":"1997"},{"issue":"5","key":"10.1016\/bs.adcom.2015.11.004_bb0370","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1145\/365151.365169","article-title":"Sets and constraint logic programming","volume":"22","author":"Dovier","year":"2000","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"3","key":"10.1016\/bs.adcom.2015.11.004_bb0375","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1352582.1352583","article-title":"A uniform approach to constraint-solving for lists, multisets, compact lists, and sets","volume":"9","author":"Dovier","year":"2008","journal-title":"ACM Trans. Comput. Log."},{"issue":"4","key":"10.1016\/bs.adcom.2015.11.004_bb0380","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2492248.2492274","article-title":"UML behavioral model based test case generation: a survey","volume":"38","author":"Shirole","year":"2013","journal-title":"SIGSOFT Softw. Eng. Notes","ISSN":"http:\/\/id.crossref.org\/issn\/0163-5948","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0385","series-title":"International Conference on Software Engineering Advances, ICSEA 2007","article-title":"Test data generation from UML state machine diagrams using GAs","author":"Doungsa-ard","year":"2007"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0390","series-title":"1st International Conference on Software Testing, Verification, and Validation, 2008","first-page":"525","article-title":"Functional Search-based Testing from State Machines","author":"Lefticaru","year":"2008"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0395","series-title":"Genetic and Evolutionary Computation Conference, GECCO \u201914, Vancouver, BC, Canada, July 12-16, 2014","first-page":"1231","article-title":"Improved heuristics for solving OCL constraints using search algorithms","author":"Ali","year":"2014"},{"issue":"10","key":"10.1016\/bs.adcom.2015.11.004_bb0400","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1109\/TSE.2013.17","article-title":"Generating test data from OCL constraints with search techniques","volume":"39","author":"Ali","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0405","series-title":"Proceedings of the 5th India Software Engineering Conference, ISEC \u201912, Kanpur, India","first-page":"97","article-title":"Transition sequence exploration of UML activity diagram using evolutionary algorithm","author":"Shirole","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0410","series-title":"Contemporary Computing","first-page":"53","article-title":"A hybrid genetic algorithm based test case generation using sequence diagrams","volume":"vol. 94","author":"Shirole","year":"2010"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0415","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1017\/S1471068413000458","article-title":"A CLP heap solver for test case generation","volume":"13","author":"Albert","year":"2013","journal-title":"Theory Pract. Logic Program."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0420","series-title":"ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201905), Chicago, IL, USA","first-page":"213","article-title":"DART: directed automated random testing","author":"Godefroid","year":"2005"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0425","series-title":"10th European Software Engineering Conference (ESEC\u201905), Lisbon, Portugal","first-page":"263","article-title":"CUTE: a concolic unit testing engine for C","author":"Sen","year":"2005"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0430","series-title":"2nd International Conference on Tests and Proofs (TAP\u201908), Prato, Italy","first-page":"134","article-title":"Pex: white box test generation for .NET","author":"Tillmann","year":"2008"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0435","series-title":"33rd International Conference on Software Engineering (ICSE\u201911), Waikiki, Honolulu, HI, USA","first-page":"1066","article-title":"Symbolic execution for software testing in practice: preliminary assessment","author":"Cadar","year":"2011"},{"issue":"2","key":"10.1016\/bs.adcom.2015.11.004_bb0440","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2408776.2408795","article-title":"Symbolic execution for software testing: three decades later","volume":"56","author":"Cadar","year":"2013","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/bs.adcom.2015.11.004_bb0445","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1145\/5397.5399","article-title":"Automatic verification of finite-state concurrent systems using temporal logic specifications","volume":"8","author":"Clarke","year":"1986","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0450","series-title":"SPIN Workshop, Rutgers University","first-page":"1066","article-title":"Specification-based testing using model checking","author":"Callahan","year":"1996"},{"issue":"3","key":"10.1016\/bs.adcom.2015.11.004_bb0455","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/stvr.402","article-title":"Testing with model checkers: a survey","volume":"19","author":"Fraser","year":"2009","journal-title":"Softw. Test. Verif. Rel."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0460","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theor. Comput. Sci."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0465","series-title":"Workshop on Verification and Control of Hybrid Systems III, no. 1066 in Lecture Notes in Computer Science","first-page":"232","article-title":"UPPAAL\u2013a tool suite for automatic verification of real-time systems","author":"Johan","year":"1995"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0470","first-page":"208","article-title":"The linear temporal logic of rewriting Maude model checker","volume":"vol. 6381","author":"Bae","year":"2010"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0475","first-page":"59","article-title":"Model checking techniques for test generation from business process models","volume":"vol. 5570","author":"Buchs","year":"2009"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0480","first-page":"1","article-title":"Automated test generation using model checking: an industrial evaluation","author":"Enoiu","year":"2014","journal-title":"Softw. Tools Technol. Transf."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0485","first-page":"79","article-title":"Online testing of real-time systems using UPPAAL","volume":"vol. 3395","author":"Larsen","year":"2004"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0490","series-title":"Formal Techniques for Distributed Objects, Components, and Systems","first-page":"84","article-title":"A model-based certification framework for the energy bus standard","volume":"vol. 8461","author":"Graf-Brill","year":"2014"},{"issue":"4","key":"10.1016\/bs.adcom.2015.11.004_bb0495","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s10009-004-0153-x","article-title":"TGV: theory, principles and algorithms: a tool for the automatic synthesis of conformance test cases for non-deterministic reactive systems","volume":"7","author":"Jard","year":"2005","journal-title":"Int. J. Softw. Tools Technol. Transf.","ISSN":"http:\/\/id.crossref.org\/issn\/1433-2779","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0500","series-title":"Tools and Algorithms for the Construction and Analysis of Systems","first-page":"708","article-title":"Using a formal model to improve verification of a cache-coherent system-on-chip","volume":"vol. 9035","author":"Kriouile","year":"2015"},{"issue":"9","key":"10.1016\/bs.adcom.2015.11.004_bb0505","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1016\/j.jss.2009.05.016","article-title":"Issues in using model checkers for test case generation","volume":"82","author":"Fraser","year":"2009","journal-title":"J. Syst. Softw."},{"issue":"2","key":"10.1016\/bs.adcom.2015.11.004_bb0510","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.cosrev.2010.06.002","article-title":"Linear temporal logic symbolic model checking","volume":"5","author":"Rozier","year":"2011","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0515","first-page":"117","article-title":"Bounded Model Checking","volume":"vol. 58","author":"Biere","year":"2003"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0520","series-title":"22nd Asian Test Symposium (ATS\u201913), Yilan, Taiwan","first-page":"233","article-title":"Functional test generation at the RTL Using Swarm Intelligence and Bounded Model Checking","author":"Gent","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0525","unstructured":"I. Schieferdecker, J. Gromann, A. Rennoch, Model based security testing selected considerations (keynote at SECTEST at ICST 2011 (accessed Septmber 25, 2012)), http:\/\/www.avantssar.eu\/sectest2011\/pdfs\/Schieferdecker-invited-talk.pdf."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0530","series-title":"Proceedings MBT 2012","first-page":"1","article-title":"Model-based security testing","author":"Schieferdecker","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0535","first-page":"647","article-title":"Research on software security testing","volume":"70","author":"Tian-yang","year":"2010","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0540","series-title":"CNSS Instruction-4009. National Information Assurance Glossary","year":"2010"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0545","series-title":"1st International Conference on Software Testing, Verification, and Validation, 2008","first-page":"238","article-title":"Test-driven assessment of access control in legacy applications","author":"le Traon","year":"2008"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0550","series-title":"Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems, MoDELS \u201908, Toulouse, France","isbn-type":"print","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","article-title":"A model-based framework for security policy specification, deployment and testing","author":"Mouelhi","year":"2008","ISBN":"http:\/\/id.crossref.org\/isbn\/9783540878742"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0555","series-title":"1st International Conference on Software Testing, Verification, and Validation, 2008","first-page":"338","article-title":"Model-based tests for access control policies","author":"Pretschner","year":"2008"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0560","series-title":"Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT \u201912, Newark, New Jersey, USA","isbn-type":"print","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/2295136.2295173","article-title":"A model-based approach to automated testing of access control policies","author":"Xu","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9781450312950"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0565","series-title":"On the Move to Meaningful Internet Systems: OTM 2013 Conferences","isbn-type":"print","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/978-3-642-41030-7_31","article-title":"Machine-readable privacy certificates for services","volume":"vol. 8185","author":"Anisetti","year":"2013","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642410291"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0570","first-page":"207","article-title":"Modeling and testing secure web applications","volume":"vol. 2","author":"Mallouli","year":"2010"},{"issue":"1","key":"10.1016\/bs.adcom.2015.11.004_bb0575","first-page":"335","article-title":"An access control model based testing approach for smart card applications: results of the POS\u00c9 project","volume":"5","author":"Masson","year":"2010","journal-title":"J. Inform. Assur. Secur."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0580","series-title":"Sixth IEEE International Conference on Software Testing, Verification and Validation, Luxembourg, Luxembourg, March 18-22, 2013","first-page":"192","article-title":"Model-based testing of cryptographic components\u2013lessons learned from experience","author":"Botella","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0585","series-title":"Sixth IEEE International Conference on Software Testing, Verification and Validation, Luxembourg, Luxembourg, March 18-22, 2013","first-page":"431","article-title":"Test generation and evaluation from high-level properties for common criteria evaluations\u2013the TASCCC testing tool","author":"Dadeau","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0590","series-title":"Foundations of Security Analysis and Design VII","isbn-type":"print","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-10082-1_1","article-title":"Model-based testing for functional and security test generation","volume":"vol. 8604","author":"Bouquet","year":"2014","ISBN":"http:\/\/id.crossref.org\/isbn\/9783319100814"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0595","series-title":"Testing Software and Systems","isbn-type":"print","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-642-41707-8_19","article-title":"A tool for supporting developers in analyzing the security of web-based security protocols","volume":"vol. 8254","author":"Pellegrino","year":"2013","ISBN":"http:\/\/id.crossref.org\/isbn\/9783642417061"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0600","series-title":"Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011","first-page":"272","article-title":"Model-based security verification and testing for smart-cards","author":"Fourneret","year":"2011"},{"issue":"1","key":"10.1016\/bs.adcom.2015.11.004_bb0605","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.entcs.2008.11.006","article-title":"Improving fault-based conformance testing","volume":"220","author":"Aichernig","year":"2008","journal-title":"Electron. Notes Theor. Comput. Sci.","ISSN":"http:\/\/id.crossref.org\/issn\/1571-0661","issn-type":"print"},{"issue":"5","key":"10.1016\/bs.adcom.2015.11.004_bb0610","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","article-title":"An analysis and survey of the development of mutation testing","volume":"37","author":"Jia","year":"2011","journal-title":"IEEE Trans. Softw. Eng.","ISSN":"http:\/\/id.crossref.org\/issn\/0098-5589","issn-type":"print"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0615","series-title":"ISSRE 2007, The 18th IEEE International Symposium on Software Reliability, Trollh\u00e4ttan, Sweden, 5-9 November 2007","first-page":"93","article-title":"Testing security policies: going beyond functional testing","author":"Traon","year":"2007"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0620","series-title":"Formal Methods and Software Engineering","first-page":"471","article-title":"Specification-based test generation for security-critical systems using mutations","volume":"vol. 2495","author":"Wimmel","year":"2002"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0625","series-title":"4th Int. Conf. on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany","first-page":"240","article-title":"Mutation-based test generation from security protocols in HLPSL","author":"Dadeau","year":"2011"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0630","series-title":"Sixth IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2013","first-page":"469","article-title":"Online model-based behavioral fuzzing","author":"Schneider","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0635","series-title":"Seventh IEEE International Conference on Software Testing, Verification and Validation (ICST), 2014","first-page":"323","article-title":"T-fuzz: model-based fuzzing for robustness testing of telecommunication protocols","author":"Johansson","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0640","series-title":"Common Weakness Enumeration","year":"2015"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0645","series-title":"Proc. of the 6th Int. Conference on Software Testing, Verification and Validation (ICST\u201913)","first-page":"471","article-title":"VERA: a flexible model-based vulnerability testing tool","author":"Blome","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0650","series-title":"IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2014","first-page":"4","article-title":"Security testing based on attack patterns","author":"Bozic","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0655","series-title":"2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"589","article-title":"Attack model based penetration test for SQL injection vulnerability","author":"Wei","year":"2012"},{"issue":"4","key":"10.1016\/bs.adcom.2015.11.004_bb0660","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/TDSC.2012.24","article-title":"Automated security test generation with formal threat models","volume":"9","author":"Xu","year":"2012","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0665","series-title":"Information Security for South Africa, 2013","first-page":"1","article-title":"Data vulnerability detection by security testing for android applications","author":"Salva","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0670","first-page":"358","article-title":"Efficient detection of multi-step cross-site scripting vulnerabilities","author":"Vernotte","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0675","series-title":"Proc. of the 6th Int. Conference on Software Security and Reliability (SERE\u201912), Gaithersburg, MD, USA","first-page":"253","article-title":"Semi-automatic security testing of web applications from a secure model","author":"Buchler","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0680","first-page":"30","article-title":"Model-based detection of CSRF","author":"Rocchetto","year":"2014"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0685","series-title":"USENIX Security Symposium","first-page":"143","article-title":"Toward automated detection of logic vulnerabilities in web applications","author":"Felmetsger","year":"2010"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0690","series-title":"Model Based Testing User Conference, Tallinn\/Estonia","article-title":"Test coverage in model-based fuzz testing","author":"Kaksonen","year":"2012"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0695","unstructured":"F. Duchene, Detection of web vulnerabilities via model inference assisted evolutionary fuzzing, Ph.D. thesis, Grenoble University, 2014 (ph.D. thesis)."},{"key":"10.1016\/bs.adcom.2015.11.004_bb0700","series-title":"Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), 2013","first-page":"1129","article-title":"A model-based behavioral fuzzing approach for network service","author":"Wang","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0705","series-title":"Trends and Benchmarks Report Switzerland. Where do we stand where are we going to? Testing 2013","year":"2013"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0710","series-title":"Companion Proceedings of the 36th International Conference on Software Engineering, ICSE Companion 2014, Hyderabad, India","isbn-type":"print","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/2591062.2591180","article-title":"Assessing model-based testing: an empirical study conducted in industry","author":"Schulze","year":"2014","ISBN":"http:\/\/id.crossref.org\/isbn\/9781450327688"},{"key":"10.1016\/bs.adcom.2015.11.004_bb0715","series-title":"International Symposium on Software Testing and Analysis, ISSTA\u201915, Baltimore, Maryland, USA, July 12-17, 2015","first-page":"385","article-title":"Automatic generation of system test cases from use case specifications","author":"Wang","year":"2015"}],"container-title":["Advances in Computers"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000650?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000650?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:12:17Z","timestamp":1567512737000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245815000650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":142,"URL":"https:\/\/doi.org\/10.1016\/bs.adcom.2015.11.004","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}