The development of complex and dependable systems like autonomous vehicles relies increasingly on the use of systems modeling language (SysML). In fact, SysML has become a de facto standard for systems engineering. With model-driven engineering, a SysML model serves as a reference for the early defect detection of the system under design: the earlier the errors are detected, the less is the cost of handling the errors. Mutation testing is a fault-based technique that has recently seen its applications to SysML behavioral models (e.g., state machine diagrams). Specifically, a system's state-transition design can be fed to a model checker where mutants are automatically generated and then killed against the desired design specifications (e.g., safety properties). In this paper, we present a novel approach based on process mining to improve the effectiveness and efficiency of the SysML mutation testing based on model checking. In our approach, the mutation operators are applied directly to the state machine diagram. These mutants are then fed as traces into a process mining tool and checked according to the event logs. Our initial results indicates that the process mining approach kills more mutants faster than the model checking method.
Magma programs related to chapter 6 of the book by Ding, Petzoldt and Schmidt.. a 3-pass version and a 5-pass version is given. After downloading the files use
Magma programs related to SFLASH in chapter 3 of the book by Ding, Petzoldt and Schmidt. The program was inteneded for signing a document. To run this program in Magma use
A document is generated at random. Provide your own documentn and change the parameters.
Magma programs for the original method of Matsumoto-Imai. Download the files and then in Magma use
The first program will generate the files private_key.txt and public_key.txt.
With load "LinearizationEquations.txt";. the equations are produced to break this method.
Experiment by changing the parameters.
Magma programs to chapter 7 pf the book "Multivariate Public Key Cryptosystems" by Ding, Petzoldt and Schmidt using the rectangular simple matrix scheme.
load "keygen.txt" will generate the file public_key.txt and private_key.txt
load "encrypt.txt"; will generate the file "ciphertexrt.txt" by encrypting a randomly generated file
load "decrypt.txt" will then decrypt that file.