Skip to main content

Showing 1–36 of 36 results for author: Nejati, S

.
  1. arXiv:2501.07553  [pdf, other

    cs.SE

    Simulink Mutation Testing using CodeBERT

    Authors: Jingfan Zhang, Delaram Ghobari, Mehrdad Sabetzadeh, Shiva Nejati

    Abstract: We present BERTiMuS, an approach that uses CodeBERT to generate mutants for Simulink models. BERTiMuS converts Simulink models into textual representations, masks tokens from the derived text, and uses CodeBERT to predict the masked tokens. Simulink mutants are obtained by replacing the masked tokens with predictions from CodeBERT. We evaluate BERTiMuS using Simulink models from an industrial benc… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

    Comments: This paper has been accepted at the 6th ACM/IEEE International Conference on Automation of Software Test (AST 2025)

  2. arXiv:2501.01606  [pdf, other

    cs.SE

    Test Input Validation for Vision-based DL Systems: An Active Learning Approach

    Authors: Delaram Ghobari, Mohammad Hossein Amini, Dai Quoc Tran, Seunghee Park, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Testing deep learning (DL) systems requires extensive and diverse, yet valid, test inputs. While synthetic test input generation methods, such as metamorphic testing, are widely used for DL testing, they risk introducing invalid inputs that do not accurately reflect real-world scenarios. Invalid test inputs can lead to misleading results. Hence, there is a need for automated validation of test inp… ▽ More

    Submitted 2 January, 2025; originally announced January 2025.

    Comments: This paper has been accepted at the Software Engineering in Practice (SEIP) track of the 47th International Conference on Software Engineering (ICSE 2025)

  3. arXiv:2410.11769  [pdf, other

    cs.SE cs.AI cs.LG

    Can Search-Based Testing with Pareto Optimization Effectively Cover Failure-Revealing Test Inputs?

    Authors: Lev Sorokin, Damir Safin, Shiva Nejati

    Abstract: Search-based software testing (SBST) is a widely adopted technique for testing complex systems with large input spaces, such as Deep Learning-enabled (DL-enabled) systems. Many SBST techniques focus on Pareto-based optimization, where multiple objectives are optimized in parallel to reveal failures. However, it is important to ensure that identified failures are spread throughout the entire failur… ▽ More

    Submitted 16 October, 2024; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: Accepted for publication by Empirical Software Engineering Journal (EMSE) (in October 2024)

  4. arXiv:2409.17781  [pdf, ps, other

    hep-th gr-qc

    Carroll dilaton supergravity in two dimensions

    Authors: Daniel Grumiller, Luciano Montecchio, Mohaddese Shams Nejati

    Abstract: We construct and discuss generic N=1 and N=2 Carroll dilaton supergravity in two dimensions. We apply our general results to the supersymmetric Carroll-Jackiw-Teitelboim model, including a discussion of specific boundary conditions. For N=2 Carroll dilaton supergravity, we find two versions, dubbed "democratic" and "despotic".

    Submitted 26 September, 2024; originally announced September 2024.

    Comments: 33pp

    Report number: TUW-24-03

  5. arXiv:2408.13950  [pdf, other

    cs.SE cs.AI

    Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems

    Authors: Mohammad Hossein Amini, Shiva Nejati

    Abstract: Deep Neural Networks (DNNs) for Autonomous Driving Systems (ADS) are typically trained on real-world images and tested using synthetic simulator images. This approach results in training and test datasets with dissimilar distributions, which can potentially lead to erroneously decreased test accuracy. To address this issue, the literature suggests applying domain-to-domain translators to test data… ▽ More

    Submitted 25 August, 2024; originally announced August 2024.

    Comments: Accepted for publication by the International Conference on Automated Software Engineering (ASE 2024)

  6. arXiv:2408.09277  [pdf, other

    cs.SE

    Developing a Llama-Based Chatbot for CI/CD Question Answering: A Case Study at Ericsson

    Authors: Daksh Chaudhary, Sri Lakshmi Vadlamani, Dimple Thomas, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: This paper presents our experience developing a Llama-based chatbot for question answering about continuous integration and continuous delivery (CI/CD) at Ericsson, a multinational telecommunications company. Our chatbot is designed to handle the specificities of CI/CD documents at Ericsson, employing a retrieval-augmented generation (RAG) model to enhance accuracy and relevance. Our empirical eva… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

    Comments: This paper has been accepted at the 40th IEEE International Conference on Software Maintenance and Evolution (ICSME 2024)

  7. arXiv:2406.20072  [pdf, other

    cs.CR cs.DM cs.LO cs.SC

    SHA-256 Collision Attack with Programmatic SAT

    Authors: Nahiyan Alamgir, Saeed Nejati, Curtis Bright

    Abstract: Cryptographic hash functions play a crucial role in ensuring data security, generating fixed-length hashes from variable-length inputs. The hash function SHA-256 is trusted for data security due to its resilience after over twenty years of intense scrutiny. One of its critical properties is collision resistance, meaning that it is infeasible to find two different inputs with the same hash. Current… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic Computation

  8. Two-dimensional (bi-)scalar gravities from four-dimensional Horndeski

    Authors: M. Shams Nejati, M. H. Vahidinia

    Abstract: We develop a classical two-dimensional bi-scalar gravity based on the Kaluza-Klein reduction applied to the four-dimensional Horndeski theory. One of the scalar fields arises from the original four-dimensional theory, while the extra scalar emerges from the reduction process. We also introduce a two-dimensional bi-scalar identity that allows for a more concise and elegant reformulation of the resu… ▽ More

    Submitted 28 October, 2024; v1 submitted 25 June, 2024; originally announced June 2024.

    Comments: 25 pages, 0 figure, Updated to match with the published version

    Journal ref: 2024 Class. Quantum Grav. 41 225013

  9. arXiv:2405.11141  [pdf, other

    cs.CR cs.SE

    Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study

    Authors: Negin Ayoughi, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: Intrusion detection systems are crucial for network security. Verification of these systems is complicated by various factors, including the heterogeneity of network platforms and the continuously changing landscape of cyber threats. In this paper, we use automata learning to derive state machines from network-traffic data with the objective of supporting behavioural verification of intrusion dete… ▽ More

    Submitted 12 July, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: This paper has been accepted at the 27th ACM / IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2024)

  10. arXiv:2405.01695  [pdf, other

    cs.SE

    Requirements-driven Slicing of Simulink Models Using LLMs

    Authors: Dipeeka Luitel, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Model slicing is a useful technique for identifying a subset of a larger model that is relevant to fulfilling a given requirement. Notable applications of slicing include reducing inspection effort when checking design adequacy to meet requirements of interest and when conducting change impact analysis. In this paper, we present a method based on large language models (LLMs) for extracting model s… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: This paper will appear at the 11th International Workshop on Artificial Intelligence and Requirements Engineering (AIRE'24)

  11. arXiv:2404.17020  [pdf, other

    cs.SE cs.AI

    Generating Minimalist Adversarial Perturbations to Test Object-Detection Models: An Adaptive Multi-Metric Evolutionary Search Approach

    Authors: Cristopher McIntyre-Garcia, Adrien Heymans, Beril Borali, Won-Sook Lee, Shiva Nejati

    Abstract: Deep Learning (DL) models excel in computer vision tasks but can be susceptible to adversarial examples. This paper introduces Triple-Metric EvoAttack (TM-EVO), an efficient algorithm for evaluating the robustness of object-detection DL models against adversarial attacks. TM-EVO utilizes a multi-metric fitness function to guide an evolutionary search efficiently in creating effective adversarial t… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  12. arXiv:2404.11542  [pdf, other

    cs.SE

    A Lean Simulation Framework for Stress Testing IoT Cloud Systems

    Authors: Jia Li, Behrad Moeini, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of Things connects a plethora of smart devices globally across various applications like smart cities, autonomous vehicles and health monitoring. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. This paper addresses a specific yet important need in simulation-based testing for I… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to the IEEE Transactions on Software Engineering. arXiv admin note: text overlap with arXiv:2208.06954

  13. arXiv:2403.08798  [pdf, other

    cs.DC

    Self-adaptive, Requirements-driven Autoscaling of Microservices

    Authors: João Paulo Karol Santos Nunes, Shiva Nejati, Mehrdad Sabetzadeh, Elisa Yumi Nakagawa

    Abstract: Microservices architecture offers various benefits, including granularity, flexibility, and scalability. A crucial feature of this architecture is the ability to autoscale microservices, i.e., adjust the number of replicas and/or manage resources. Several autoscaling solutions already exist. Nonetheless, when employed for diverse microservices compositions, current solutions may exhibit suboptimal… ▽ More

    Submitted 1 February, 2024; originally announced March 2024.

    Comments: This paper has been accepted at the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024)

  14. arXiv:2312.05631  [pdf, other

    cs.SE

    Test Generation Strategies for Building Failure Models and Explaining Spurious Failures

    Authors: Baharin Aliashrafi Jodat, Abhishek Chandar, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Test inputs fail not only when the system under test is faulty but also when the inputs are invalid or unrealistic. Failures resulting from invalid or unrealistic test inputs are spurious. Avoiding spurious failures improves the effectiveness of testing in exercising the main functions of a system, particularly for compute-intensive (CI) systems where a single test execution takes significant time… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: This paper is accepted at the ACM Transactions on Software Engineering and Methodology (TOSEM) in December 2023

  15. arXiv:2311.18768  [pdf, other

    cs.SE cs.AI

    Evaluating the Impact of Flaky Simulators on Testing Autonomous Driving Systems

    Authors: Mohammad Hossein Amini, Shervin Naseri, Shiva Nejati

    Abstract: Simulators are widely used to test Autonomous Driving Systems (ADS), but their potential flakiness can lead to inconsistent test results. We investigate test flakiness in simulation-based testing of ADS by addressing two key questions: (1) How do flaky ADS simulations impact automated testing that relies on randomized algorithms? and (2) Can machine learning (ML) effectively identify flaky ADS tes… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: Accepted for publication by Empirical Software Engineering Journal (EMSE) (in November 2023)

  16. Jackiw-Teitelboim Gravity Generates Horndeski via Disformal Transformations

    Authors: M. Shams Nejati, M. H. Vahidinia

    Abstract: We show that the most general two-dimensional dilaton gravity theory with second-order field equations, which includes Horndeski and Kinetic Gravity Braiding families, may be obtained from the Jackiw-Teitelboim (JT) gravity through a general disformal transformation, up to boundary terms. This map does not change the degrees of freedom if the invertible transformation is applied. We also show that… ▽ More

    Submitted 10 February, 2024; v1 submitted 15 August, 2023; originally announced August 2023.

    Comments: 14 pages, 1 figure, an important example added, reference added, updated to match the published version

    Report number: IPM/P-2023/54

    Journal ref: Phys.Lett.B 850 (2024) 138499

  17. arXiv:2306.00316  [pdf, other

    cs.SE

    Using Genetic Programming to Build Self-Adaptivity into Software-Defined Networks

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Self-adaptation solutions need to periodically monitor, reason about, and adapt a running system. The adaptation step involves generating an adaptation strategy and applying it to the running system whenever an anomaly arises. In this article, we argue that, rather than generating individual adaptation strategies, the goal should be to adapt the control logic of the running system in such a way th… ▽ More

    Submitted 15 August, 2023; v1 submitted 31 May, 2023; originally announced June 2023.

    Comments: Accepted for publication by ACM Transactions on Autonomous and Adaptive Systems (TAAS) (in Aug 2023). arXiv admin note: substantial text overlap with arXiv:2205.04352

  18. arXiv:2305.00083  [pdf, other

    cs.SE

    Reflections on Surrogate-Assisted Search-Based Testing: A Taxonomy and Two Replication Studies based on Industrial ADAS and Simulink Models

    Authors: Shiva Nejati, Lev Sorokin, Damir Safin, Federico Formica, Mohammad Mahdi Mahboob, Claudio Menghi

    Abstract: Surrogate-assisted search-based testing (SA-SBT) aims to reduce the computational time for testing compute-intensive systems. Surrogates enhance testing techniques by improving test case generation focusing the testing budget on the most critical portions of the input domain. In addition, they can serve as approximations of the system under test (SUT) to predict tests' results instead of executing… ▽ More

    Submitted 28 April, 2023; originally announced May 2023.

    Comments: Submitted to the Information and Software Technology Journal

  19. arXiv:2302.10288  [pdf, other

    cs.SE

    Probabilistic Safe WCET Estimation for Weakly Hard Real-Time Systems at Design Stages

    Authors: Jaekwon Lee, Seung Yeob Shin, Lionel Briand, Shiva Nejati

    Abstract: Weakly hard real-time systems can, to some degree, tolerate deadline misses, but their schedulability still needs to be analyzed to ensure their quality of service. Such analysis usually occurs at early design stages to provide implementation guidelines to engineers so that they can make better design decisions. Estimating worst-case execution times (WCET) is a key input to schedulability analysis… ▽ More

    Submitted 11 August, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: Accepted for publication by TOSEM (in Aug 2023)

  20. arXiv:2212.08726  [pdf, other

    cs.SE

    Learning Non-robustness using Simulation-based Testing: a Network Traffic-shaping Case Study

    Authors: Baharin Aliashrafi Jodat, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: An input to a system reveals a non-robust behaviour when, by making a small change in the input, the output of the system changes from acceptable (passing) to unacceptable (failing) or vice versa. Identifying inputs that lead to non-robust behaviours is important for many types of systems, e.g., cyber-physical and network systems, whose inputs are prone to perturbations. In this paper, we propose… ▽ More

    Submitted 22 January, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: This paper is accepted at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST 2023)

  21. arXiv:2208.06954  [pdf, other

    cs.SE

    A Domain-Specific Language for Simulation-Based Testing of IoT Edge-to-Cloud Solutions

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of things (IoT) is increasingly prevalent in domains such as emergency response, smart cities and autonomous vehicles. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. In this paper, we propose a domain-specific language (DSL) for generating edge-to-cloud simulators. An edge-to-… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

  22. arXiv:2206.12492  [pdf, other

    cs.SE

    Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation

    Authors: Danny Weyns, Ilias Gerostathopoulos, Barbora Buhnova, Nicolas Cardozo, Emilia Cioroaica, Ivana Dusparic, Lars Grunske, Pooyan Jamshidi, Christine Julien, Judith Michael, Gabriel Moreno, Shiva Nejati, Patrizio Pelliccione, Federico Quin, Genaina Rodrigues, Bradley Schmerl, Marco Vieira, Thomas Vogel, Rebekka Wohlrab

    Abstract: Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

    Comments: 7 pages

  23. arXiv:2205.04352  [pdf, other

    cs.SE

    Learning Self-adaptations for IoT Networks: A Genetic Programming Approach

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Internet of Things (IoT) is a pivotal technology in application domains that require connectivity and interoperability between large numbers of devices. IoT systems predominantly use a software-defined network (SDN) architecture as their core communication backbone. This architecture offers several advantages, including the flexibility to make IoT networks self-adaptive through software programmab… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  24. Optimal Priority Assignment for Real-Time Systems: A Coevolution-Based Approach

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand

    Abstract: In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is critical to allow the tasks to complete their executions while maximizing safety margins from their specified deadlines. This enables real-time systems to tolerate unexpected overheads in task executio… ▽ More

    Submitted 21 March, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

  25. Can Offline Testing of Deep Neural Networks Replace Their Online Testing?

    Authors: Fitash Ul Haq, Donghwan Shin, Shiva Nejati, Lionel Briand

    Abstract: We distinguish two general modes of testing for Deep Neural Networks (DNNs): Offline testing where DNNs are tested as individual units based on test datasets obtained without involving the DNNs under test, and online testing where DNNs are embedded into a specific application environment and tested in a closed-loop mode in interaction with the application environment. Typically, DNNs are subjected… ▽ More

    Submitted 30 April, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: Journal extension of arXiv:1912.00805; To appear in Empirical Software Engineering

    Journal ref: Empir Software Eng 26, 90 (2021)

  26. arXiv:2101.01933  [pdf, other

    cs.SE

    Combining Genetic Programming and Model Checking to Generate Environment Assumptions

    Authors: Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Software verification may yield spurious failures when environment assumptions are not accounted for. Environment assumptions are the expectations that a system or a component makes about its operational environment and are often specified in terms of conditions over the inputs of that system or component. In this article, we propose an approach to automatically infer environment assumptions for C… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

  27. arXiv:2012.13188  [pdf, other

    cs.CV cs.HC

    Control of Computer Pointer Using Hand Gesture Recognition in Motion Pictures

    Authors: Yalda Foroutan, Ahmad Kalhor, Saeid Mohammadi Nejati, Samad Sheikhaei

    Abstract: This paper presents a user interface designed to enable computer cursor control through hand detection and gesture classification. A comprehensive hand dataset comprising 6720 image samples was collected, encompassing four distinct classes: fist, palm, pointing to the left, and pointing to the right. The images were captured from 15 individuals in various settings, including simple backgrounds wit… ▽ More

    Submitted 9 June, 2023; v1 submitted 24 December, 2020; originally announced December 2020.

    Comments: 9 pages, 6 figures, 2 tables

  28. arXiv:2012.06822  [pdf, other

    cs.SE cs.AI

    Digital Twins Are Not Monozygotic -- Cross-Replicating ADAS Testing in Two Industry-Grade Automotive Simulators

    Authors: Markus Borg, Raja Ben Abdessalem, Shiva Nejati, Francois-Xavier Jegeden, Donghwan Shin

    Abstract: The increasing levels of software- and data-intensive driving automation call for an evolution of automotive software testing. As a recommended practice of the Verification and Validation (V&V) process of ISO/PAS 21448, a candidate standard for safety of the intended functionality for road vehicles, simulation-based testing has the potential to reduce both risks and costs. There is a growing body… ▽ More

    Submitted 28 January, 2021; v1 submitted 12 December, 2020; originally announced December 2020.

    Comments: To appear in the Proc. of the IEEE International Conference on Software Testing, Verification and Validation (ICST) 2021

  29. Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task executions always complete before their specified deadlines. However, in practice, engineers often cannot provide precise point WCET estimates and prefer to provide plausible WCET ranges. G… ▽ More

    Submitted 7 June, 2022; v1 submitted 20 July, 2020; originally announced July 2020.

  30. arXiv:2005.13415  [pdf, other

    cs.LO cs.CR

    CDCL(Crypto) SAT Solvers for Cryptanalysis

    Authors: Saeed Nejati, Vijay Ganesh

    Abstract: Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-driven clause-learning Boolean satisfiability (CDCL SAT) solvers on industrial problems from a variety of domains. The availability of such powerful general-purpose search tools as SAT solvers has led many researchers to propose SAT-based methods for cryptanalysis, including techniques for finding collisio… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering 2019 (CASCON 2019)

  31. Comparing Offline and Online Testing of Deep Neural Networks: An Autonomous Car Case Study

    Authors: Fitash Ul Haq, Donghwan Shin, Shiva Nejati, Lionel Briand

    Abstract: There is a growing body of research on developing testing techniques for Deep Neural Networks (DNN). We distinguish two general modes of testing for DNNs: Offline testing where DNNs are tested as individual units based on test datasets obtained independently from the DNNs under test, and online testing where DNNs are embedded into a specific application and tested in a close-loop mode in interacti… ▽ More

    Submitted 28 November, 2019; originally announced December 2019.

  32. arXiv:1910.02837  [pdf, other

    cs.SE

    Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification

    Authors: Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

  33. Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach

    Authors: Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, Chetan Arora, Frank Zimmer

    Abstract: The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situat… ▽ More

    Submitted 15 May, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: This paper has been accepted at IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020)

  34. arXiv:1905.03490  [pdf, other

    cs.SE

    Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models

    Authors: Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe

    Abstract: Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 10 pages + 2 page references

  35. arXiv:1903.03399  [pdf, other

    cs.SE

    Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors

    Authors: Claudio Menghi, Shiva Nejati, Khouloud Gaaloul, Lionel Briand

    Abstract: Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test outputs in an online manner to stop expensive test executions as soon as a failure is detected; (ii) they should handle time- and magnitude-continuous CPS behaviors; (iii) they should provide a quant… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

  36. arXiv:1608.04720  [pdf, other

    cs.CR

    Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions

    Authors: Saeed Nejati, Jia Hui Liang, Vijay Ganesh, Catherine Gebotys, Krzysztof Czarnecki

    Abstract: SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and use MapleCrypt to construct preimages for these… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.