{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:19:35Z","timestamp":1763227175252,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031156281"},{"type":"electronic","value":"9783031156298"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15629-8_8","type":"book-chapter","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T16:26:53Z","timestamp":1664036813000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Family-Based Fingerprint Analysis: A Position Paper"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8492-7484","authenticated-orcid":false,"given":"Carlos Diego N.","family":"Damasceno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5969-3521","authenticated-orcid":false,"given":"Daniel","family":"Str\u00fcber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-55754-6_1","volume-title":"NASA Formal Methods","author":"BK Aichernig","year":"2020","unstructured":"Aichernig, B.K., Pferscher, A., Tappler, M.: From passive to active: learning timed automata efficiently. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 1\u201319. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6_1"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s10817-018-9486-0","volume":"63","author":"BK Aichernig","year":"2018","unstructured":"Aichernig, B.K., Tappler, M.: Efficient active automata learning via mutation testing. J. Autom. Reason. 63(4), 1103\u20131134 (2018). https:\/\/doi.org\/10.1007\/s10817-018-9486-0","journal-title":"J. Autom. Reason."},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3486860","volume":"55","author":"S Alrabaee","year":"2022","unstructured":"Alrabaee, S., Debbabi, M., Wang, L.: A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features. ACM Comput. Surv. 55(1), 1\u201341 (2022). https:\/\/doi.org\/10.1145\/3486860","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987). https:\/\/doi.org\/10.1016\/0890-5401(87)90052-6","journal-title":"Inf. Comput."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Apel, S., Batory, D., K\u00e4stner, C., Saake, G.: Feature-Oriented Software Product Lines. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37521-7","DOI":"10.1007\/978-3-642-37521-7"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Benduhn, F., Th\u00fcm, T., Lochau, M., Leich, T., Saake, G.: A survey on modeling techniques for formal behavioral verification of software product lines. In: Proceedings of the Ninth International Workshop on Variability Modelling of Software-intensive Systems, pp. 80:80\u201380:87. VaMoS 2015. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2701319.2701332, event-place: Hildesheim, Germany","DOI":"10.1145\/2701319.2701332"},{"key":"8_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102678","volume":"209","author":"P van den Bos","year":"2021","unstructured":"van den Bos, P., Vaandrager, F.: State identification for labeled transition systems with inputs and outputs. Sci. Comput. Program. 209, 102678 (2021). https:\/\/doi.org\/10.1016\/j.scico.2021.102678","journal-title":"Sci. Comput. Program."},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. LNCS, vol. 3472. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b137241","DOI":"10.1007\/b137241"},{"issue":"8","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSE.2012.86","volume":"39","author":"A Classen","year":"2013","unstructured":"Classen, A., Cordy, M., Schobbens, P.Y., Heymans, P., Legay, A., Raskin, J.F.: Featured transition systems: foundations for verifying variability-intensive systems and their application to LTL model checking. IEEE Trans. Softw. Eng. 39(8), 1069\u20131089 (2013). https:\/\/doi.org\/10.1109\/TSE.2012.86","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-030-34968-4_8","volume-title":"Integrated Formal Methods","author":"CDN Damasceno","year":"2019","unstructured":"Damasceno, C.D.N., Mousavi, M.R., da Silva Simao, A.: Learning to reuse: adaptive model learning for evolving systems. In: Ahrendt, W., Tapia Tarifa, S.L. (eds.) IFM 2019. LNCS, vol. 11918, pp. 138\u2013156. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34968-4_8"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Damasceno, C.D.N., Mousavi, M.R., Simao, A.: Learning from difference: an automated approach for learning family models from software product lines [research]. In: Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A. SPLC 2019. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3336294.3336307","DOI":"10.1145\/3336294.3336307"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09912-w","volume":"26","author":"CDN Damasceno","year":"2021","unstructured":"Damasceno, C.D.N., Mousavi, M.R., Simao, A.S.: Learning by sampling: learning behavioral family models from software product lines. Empir. Softw. Eng. 26(1), 1\u201346 (2021). https:\/\/doi.org\/10.1007\/s10664-020-09912-w","journal-title":"Empir. Softw. Eng."},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.Y., Heymans, P.: Featured model-based mutation analysis. In: Proceedings of the 38th International Conference on Software Engineering, pp. 655\u2013666. ICSE 2016, New York (2016). https:\/\/doi.org\/10.1145\/2884781.2884821","DOI":"10.1145\/2884781.2884821"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"142893","DOI":"10.1109\/ACCESS.2021.3121606","volume":"9","author":"A Elmaghbub","year":"2021","unstructured":"Elmaghbub, A., Hamdaoui, B.: LoRa device fingerprinting in the wild: disclosing RF Data-driven fingerprint sensitivity to deployment variability. IEEE Access 9, 142893\u2013142909 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3121606","journal-title":"IEEE Access"},{"key":"8_CR15","unstructured":"Fiterau-Brostean, P., Jonsson, B., Merget, R., de\u00a0Ruiter, J., Sagonas, K., Somorovsky, J.: Analysis of DTLS implementations using protocol state fuzzing. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2523\u20132540. USENIX Association, August 2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/fiterau-brostean"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-319-41540-6_25","volume-title":"Computer Aided Verification","author":"P Fiter\u0103u-Bro\u015ftean","year":"2016","unstructured":"Fiter\u0103u-Bro\u015ftean, P., Janssen, R., Vaandrager, F.: Combining model learning and model checking to analyze TCP implementations. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 454\u2013471. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41540-6_25"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Fragal, V.H., Simao, A., Mousavi, M.R.: Validated test models for software product lines: featured finite state machines. In: Kouchnarenko, O., Khosravi, R. (eds.) Formal Aspects of Component Software: 13th International Conference, FACS 2016. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57666-4_13","DOI":"10.1007\/978-3-319-57666-4_13"},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy046","author":"VH Fragal","year":"2018","unstructured":"Fragal, V.H., Simao, A., Mousavi, M.R., Turker, U.C.: Extending HSI test generation method for software product lines. Comput. J. (2018). https:\/\/doi.org\/10.1093\/comjnl\/bxy046","journal-title":"Comput. J."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-030-00244-2_11","volume-title":"Formal Methods for Industrial Critical Systems","author":"D Huistra","year":"2018","unstructured":"Huistra, D., Meijer, J., van de Pol, J.: Adaptive learning for learn-based regression testing. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 162\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00244-2_11"},{"key":"8_CR20","unstructured":"Janssen, E.: Fingerprinting TLS implementations using model learning. Master\u2019s thesis, Radboud Universit, Nijmegen, March 2021"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, A.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report CMU\/SEI-90-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (1990)","DOI":"10.21236\/ADA235785"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Kenner, A., May, R., Kr\u00fcger, J., Saake, G., Leich, T.: Safety, security, and configurable software systems: a systematic mapping study. In: Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume A. New York, September 2021. https:\/\/doi.org\/10.1145\/3461001.3471147","DOI":"10.1145\/3461001.3471147"},{"issue":"8","key":"8_CR23","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996). https:\/\/doi.org\/10.1109\/5.533956","journal-title":"Proc. IEEE"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-030-22348-9_23","volume-title":"Models, Mindsets, Meta: The What, the How, and the Why Not?","author":"D Neider","year":"2019","unstructured":"Neider, D., Smetsers, R., Vaandrager, F., Kuppens, H.: Benchmarks for automata learning and conformance testing. In: Margaria, T., Graf, S., Larsen, K.G. (eds.) Models, Mindsets, Meta: The What, the How, and the Why Not? LNCS, vol. 11200, pp. 390\u2013416. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22348-9_23"},{"key":"8_CR25","unstructured":"NVD: The National Vulnerability Database (2022). https:\/\/nvd.nist.gov\/"},{"key":"8_CR26","unstructured":"OpenSSL Foundation Inc: OpenSSL Releases on Github (2022). https:\/\/github.com\/openssl\/openssl\/releases"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Peldszus, S., Str\u00fcber, D., J\u00fcrjens, J.: Model-based security analysis of feature-oriented software product lines. In: Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, pp. 93\u2013106 (2018). https:\/\/doi.org\/10.1145\/3278122.3278126","DOI":"10.1145\/3278122.3278126"},{"key":"8_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111044","volume":"182","author":"JA Pereira","year":"2021","unstructured":"Pereira, J.A., Acher, M., Martin, H., J\u00e9z\u00e9quel, J.M., Botterweck, G., Ventresque, A.: Learning software configuration spaces: a systematic literature review. J. Syst. Softw. 182, 111044 (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.111044","journal-title":"J. Syst. Softw."},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/978-3-030-90870-6_28","volume-title":"Formal Methods","author":"A Pferscher","year":"2021","unstructured":"Pferscher, A., Aichernig, B.K.: Fingerprinting Bluetooth low energy devices via active automata learning. In: Huisman, M., P\u0103s\u0103reanu, C., Zhan, N. (eds.) FM 2021. LNCS, vol. 13047, pp. 524\u2013542. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90870-6_28"},{"issue":"4","key":"8_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3280986","volume":"27","author":"AV Rhein","year":"2018","unstructured":"Rhein, A.V., Liebig, J., Janker, A., K\u00e4stner, C., Apel, S.: Variability-aware static analysis at scale: an empirical study. ACM Trans. Softw. Eng. Methodol. 27(4), 1\u201333 (2018). https:\/\/doi.org\/10.1145\/3280986","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-47560-8_11","volume-title":"Secure IT Systems","author":"J Ruiter","year":"2016","unstructured":"Ruiter, J.: A tale of the OpenSSL state machine: a large-scale black-box analysis. In: Brumley, B.B., R\u00f6ning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 169\u2013184. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47560-8_11"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-60876-1_14","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"P Shirani","year":"2017","unstructured":"Shirani, P., Wang, L., Debbabi, M.: BinShape: scalable and robust binary library function identification using function shape. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 301\u2013324. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_14"},{"issue":"11","key":"8_CR33","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1109\/TPDS.2011.26","volume":"22","author":"G Shu","year":"2011","unstructured":"Shu, G., Lee, D.: A formal methodology for network protocol fingerprinting. IEEE Trans. Parallel Distrib. Syst. 22(11), 1813\u20131825 (2011). https:\/\/doi.org\/10.1109\/TPDS.2011.26","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Tappler, M., Aichernig, B.K., Bloem, R.: Model-based testing IoT communication via active automata learning. In: 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), March 2017. https:\/\/doi.org\/10.1109\/ICST.2017.32","DOI":"10.1109\/ICST.2017.32"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-030-29662-9_13","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"M Tappler","year":"2019","unstructured":"Tappler, M., Aichernig, B.K., Larsen, K.G., Lorber, F.: Time to learn \u2013 learning timed automata from tests. In: Andr\u00e9, \u00c9., Stoelinga, M. (eds.) FORMATS 2019. LNCS, vol. 11750, pp. 216\u2013235. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29662-9_13"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Tavassoli, S., Damasceno, C.D.N., Khosravi, R., Mousavi, M.R.: Adaptive behavioral model learning for software product lines. In: Proceedings of the 26th International Systems and Software Product Line Conference, SPLC 2022 (2022)","DOI":"10.1145\/3546932.3546991"},{"issue":"1","key":"8_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2580950","volume":"47","author":"T Th\u00fcm","year":"2014","unstructured":"Th\u00fcm, T., Apel, S., K\u00e4stner, C., Schaefer, I., Saake, G.: A classification and survey of analysis strategies for software product lines. ACM Comput. Surv. 47(1), 1\u201345 (2014). https:\/\/doi.org\/10.1145\/2580950","journal-title":"ACM Comput. Surv."},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Vaandrager, F.: Model learning. Commun. ACM 60(2) (2017). https:\/\/doi.org\/10.1145\/2967606","DOI":"10.1145\/2967606"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Vaandrager, F., Garhewal, B., Rot, J., Wi\u00dfmann, T.: A new approach for active automata learning based on apartness. In: Proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), January 2022. http:\/\/arxiv.org\/abs\/2107.05419","DOI":"10.1007\/978-3-030-99524-9_12"},{"issue":"2","key":"8_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2430545.2430549","volume":"22","author":"N Walkinshaw","year":"2013","unstructured":"Walkinshaw, N., Bogdanov, K.: Automated comparison of state-based software models in terms of their language and structure. ACM Trans. Softw. Eng. Methodol. 22(2), 1\u201337 (2013). https:\/\/doi.org\/10.1145\/2430545.2430549","journal-title":"ACM Trans. Softw. Eng. Methodol."}],"container-title":["Lecture Notes in Computer Science","A Journey from Process Algebra via Timed Automata to Model Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15629-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T16:28:14Z","timestamp":1664036894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15629-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156281","9783031156298"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15629-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}