{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T12:57:39Z","timestamp":1760014659248,"version":"3.41.0"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>SysML models are widely used for designing and analyzing complex systems. Model-based design methods often require successive modifications of the models, whether for incrementally refining the design (e.g., in agile development methods) or for testing different design options. Such modifications, or mutations, are also used in mutation-based testing approaches. However, the definition of mutation operators can be a complex issue, and applying them to models is sometimes performed by hand: this is time consuming and error prone. This article addresses this issue thanks to the introduction of AMULET, the first mutation language for SysML. AMULET encompasses the modifications targeting SysML block and state-machine diagrams and is supported by a compiler the article presents. This compiler is integrated in TTool, an open-source SysML toolkit, enabling the full support of design methods including model design, mutation, and verification tasks in a unique toolkit. The article also introduces two case studies providing concrete examples of AMULET use for modeling vulnerabilities and cyber attacks and highlighting the benefits of AMULET for SysML mutations.<\/jats:p>","DOI":"10.1145\/3624583","type":"journal-article","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T10:22:44Z","timestamp":1694859764000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["AMULET: A Mutation Language Enabling Automatic Enrichment of SysML Models"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5031-5794","authenticated-orcid":false,"given":"Bastien","family":"Sultan","sequence":"first","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP, Saint-\u00c9tienne, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1880-0602","authenticated-orcid":false,"given":"L\u00e9on","family":"Fr\u00e9not","sequence":"additional","affiliation":[{"name":"\u00c9cole Normale Sup\u00e9rieure de Lyon, Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1167-4639","authenticated-orcid":false,"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2791-7903","authenticated-orcid":false,"given":"Philippe","family":"Jaillon","sequence":"additional","affiliation":[{"name":"Mines Saint-Etienne, CEA, Leti, Centre CMP, Saint-\u00c9tienne, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9988-2249","authenticated-orcid":false,"given":"Sophie","family":"Coudert","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"1","volume-title":"International Conference on Tests and Proofs","author":"Aichernig Bernhard K.","year":"2014","unstructured":"Bernhard K. Aichernig, Jakob Auer, Elisabeth J\u00f6bstl, Robert Koro\u0161ec, Willibald Krenn, Rupert Schlick, and Birgit Vera Schmidt. 2014. Model-based mutation testing of an industrial measurement device. In International Conference on Tests and Proofs. Springer, 1\u201319."},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-319-10506-2_4","volume-title":"International Conference on Computer Safety, Reliability, and Security","author":"Aichernig Bernhard K.","year":"2014","unstructured":"Bernhard K. Aichernig, Klaus H\u00f6rmaier, and Florian Lorber. 2014. Debugging with timed automata mutations. In International Conference on Computer Safety, Reliability, and Security. Springer, 49\u201364."},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/QSIC.2005.63","volume-title":"5th International Conference on Quality Software (QSIC\u201905)","author":"Aichernig Bernhard K.","year":"2005","unstructured":"Bernhard K. Aichernig and Percy Antonio Pari Salas. 2005. Test case generation by OCL mutation and constraint solving. In 5th International Conference on Quality Software (QSIC\u201905). IEEE, 64\u201371."},{"key":"e_1_3_2_5_2","first-page":"848","volume-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920)","author":"Alenazi Mounifah","year":"2020","unstructured":"Mounifah Alenazi, Nan Niu, and Juha Savolainen. 2020. A novel approach to tracing safety requirements and state-based design models. In 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920). IEEE, 848\u2013860."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-030-16874-2_3","volume-title":"Security and Safety Interplay of Intelligent Software Systems","author":"Ameur-Boulifa Rab\u00e9a","year":"2019","unstructured":"Rab\u00e9a Ameur-Boulifa, Florian Lugou, and Ludovic Apvrille. 2019. SysML model transformation for safety and security analysis. In Security and Safety Interplay of Intelligent Software Systems, Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing, Cham, 35\u201349."},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Ludovic Apvrille Pierre de Saqui-Sannes Hoana Hotescu and Alessandro Tempia-Calvino. 2022. SysML models verification relying on dependency graphs. In Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development (ModelsWard). 174\u2013181.","DOI":"10.5220\/0010792900003119"},{"key":"e_1_3_2_8_2","unstructured":"Ludovic Apvrille and Yves Roudier. 2013. SysML-Sec: A SysML environment for the design and development of secure embedded systems. In Asia-Pacific Council on Systems Engineering (APCOSEC\u201913). Yokohama."},{"key":"e_1_3_2_9_2","volume-title":"Proceedings of the 11th International Conference on Model-driven Engineering and Software Development (MODELSWARD\u201923)","author":"Apvrille Ludovic","year":"2023","unstructured":"Ludovic Apvrille, Bastien Sultan, Oana Andreea Hotescu, Pierre de Saqui-Sannes, and Sophie Coudert. 2023. Mutation of formally verified SysML models. In Proceedings of the 11th International Conference on Model-driven Engineering and Software Development (MODELSWARD\u201923)."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1532"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC.2010.37"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.2514\/1.i010950"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","DOI":"10.21236\/ADA354756","volume-title":"Model-based Verification: A Technology for Dependable System Upgrade","author":"Gluch David P.","year":"1998","unstructured":"David P. Gluch and Charles B. Weinstock. 1998. Model-based Verification: A Technology for Dependable System Upgrade. Technical Report. Carnegie-Mellon\/University of Pittsburgh Software Engineering Institute."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"1968","DOI":"10.1145\/2851613.2851751","volume-title":"Proceedings of the 31st Annual ACM Symposium on Applied Computing","author":"G\u00f3mez-Abajo Pablo","year":"2016","unstructured":"Pablo G\u00f3mez-Abajo, Esther Guerra, and Juan de Lara. 2016. Wodel: A domain-specific language for model mutation. In Proceedings of the 31st Annual ACM Symposium on Applied Computing. 1968\u20131973."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-020-00827-0"},{"key":"e_1_3_2_16_2","unstructured":"Kunxiang Jin and Kevin Lano. 2021. Mutation operators for object constraint language specification. In Software Technologies: Applications and Foundations (STAF) Workshops. 128\u2013134."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.2478\/ausi-2014-0006"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.023"},{"volume-title":"Object Constraint Language \u2013 Version 2.4","year":"2014","key":"e_1_3_2_20_2","unstructured":"OMG. 2014. Object Constraint Language \u2013 Version 2.4. Technical Report."},{"volume-title":"OMG Systems Modeling Language \u2013 Version 1.5","year":"2017","key":"e_1_3_2_21_2","unstructured":"OMG. 2017. OMG Systems Modeling Language \u2013 Version 1.5. Technical Report."},{"key":"e_1_3_2_22_2","first-page":"1","volume-title":"2011 11th Annual International Conference on New Technologies of Distributed Systems","author":"Pedroza Gabriel","year":"2011","unstructured":"Gabriel Pedroza, Ludovic Apvrille, and Daniel Knorreck. 2011. AVATAR: A SysML environment for the formal verification of safety and security properties. In 2011 11th Annual International Conference on New Technologies of Distributed Systems. IEEE, 1\u201310."},{"key":"e_1_3_2_23_2","unstructured":"Percy Antonio Pari Salas and Bernhard K. Aichernig. 2005. Automatic test case generation for OCL: A mutation approach. UNU-IIST Report 321 (2005)."},{"key":"e_1_3_2_24_2","volume-title":"Ma\u00eetrise des correctifs de s\u00e9curit\u00e9 pour les syst\u00e8mes navals","author":"Sultan Bastien","year":"2020","unstructured":"Bastien Sultan. 2020. Ma\u00eetrise des correctifs de s\u00e9curit\u00e9 pour les syst\u00e8mes navals. Ph. D. Dissertation. Ecole nationale sup\u00e9rieure Mines-T\u00e9l\u00e9com Atlantique Bretagne Pays de la Loire."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010832300003119"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-031-38821-7_10","volume-title":"Model-driven Engineering and Software Development","author":"Sultan Bastien","year":"2023","unstructured":"Bastien Sultan, Ludovic Apvrille, Philippe Jaillon, and Sophie Coudert. 2023. W-Sec: A model-based formal method for assessing the impacts of security countermeasures. In Model-driven Engineering and Software Development, Lu\u00eds Ferreira Pires, Slimane Hammoudi, and Edwin Seidewitz (Eds.). Springer Nature Switzerland, Cham, 203\u2013229."},{"key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-319-72817-9_5","volume-title":"Computer Security","author":"Sultan Bastien","year":"2018","unstructured":"Bastien Sultan, Fabien Dagnat, and Caroline Fontaine. 2018. A methodology to assess vulnerabilities and countermeasures impact on the missions of a naval system. In Computer Security, Sokratis K. Katsikas, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Ant\u00f3n, and Stefanos Gritzalis (Eds.). Springer International Publishing, Cham, 63\u201376."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.5555\/1102024"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3624583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:46Z","timestamp":1750268986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3624583"],"URL":"https:\/\/doi.org\/10.1145\/3624583","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2025,5,13]]},"assertion":[{"value":"2023-02-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}