Systematic mapping study on verification and validation of industrial third-party IoT applications

dc.citation.epage43
dc.citation.issueVolume 5, № 1
dc.citation.journalTitleAdvances in Cyber-Physical Systems
dc.citation.spage29
dc.contributor.affiliationSiemens Corporate Technology
dc.contributor.authorTritchkov Ivan
dc.date.accessioned2022-11-28T10:08:01Z
dc.date.available2022-11-28T10:08:01Z
dc.date.issued2020
dc.date.submitted2022
dc.description.abstractThe next industrial revolution commonly known as Industry 4.0 represents the idea of interconnected manu facturing, where intelligent devices, systems and processes exchange information, resources and artifacts to optimize the complete value-added chain and to reduce costs and time-tomarket. Industrial software ecosystems are a good example how the latest digitalization trends are applied in the industry domain and how with the help of industrial IoT applications the production process can be optimized. However, the use of third-party applications exposes to a risk the systems and devices part of the manufacturing process. To address these risks a set of quality measures must be carried out in the ecosystem. This paper presents the results of a systematic mapping study carried out in the area of verification and validation of industrial IoT third-party applications. The goal of the study is to structure the scientific landscape and to provide an up-to-date snapshot of the current state of the research field.
dc.format.pages29-43
dc.identifier.citationТritchkov I. Systematic mapping study on verification and validation of industrial third-party IoT applications / Ivan Tritchkov // Advances in Cyber-Physical Systems. – Lviv : Lviv Politechnic Publishing House, 2020. – Volume 5, № 1. – P. 29–43 . – Bibliography: 77 titles.
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/57227
dc.language.isoen
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems
dc.relation.references[1] Federal Ministry for Economic Affairs and Energy, “What is Industry 4.0?”, 2019. [2] Fraunhofer, “Begriffsdefinitionen rund um Industrie 4.0”, Fraunhofer Institute, 2015. [3] “Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks”, ITU T Y. 2060, 2012. [4] Messerschmitt D. and SzyperskiC. A. Software Ecosystem: Understanding an Indispensable Technology and Industry. MIT Press, 2003. [5] Bosch J.; and Bosch-Sijsema P. “Software Product Lines, Global Development and Ecosystems: Collaboration in Software Engineering”, in Collaborative Software Engi neering, Springer Verlag, 2010. [6] Jansen S., Finkelstein A. and Brinkkemper S. “A sense of community: A research agenda for software ecosystems”, 2009 31st Int. Conf. Softw. Eng. – Companion Vol. ICSE 2009, pp. 187–190, 2009. [7] Manikas K. and Hansen K. M. “Software ecosystems-A systematic literature review”, J. Syst. Softw., vol. 86, no. 5, pp. 1294–1306, 2013. [8] Jansen S., Brinkkemper S. and Finkelstein A. “Business network management as a survival strategy: A tale of two software ecosystems”, CEUR Workshop Proc., vol. 505, no. 2, pp. 34–48, 2009. [9] Kitchenham B. “Guidelines for performing Systematic Literature Reviews in Software Engineering ppt,” 2001. [10] Petersen K., Feldt R., Mujtaba S. and Mattsson M. “Syste matic Mapping Studies in Software Engineering”, in Inter national Journal of Software Engineering & Knowledge Engineering, vol. 17, no. 1, pp. 33–55, 2008. [11] García-Holgado A. and García-Peñalvo F. J. “Mapping the systematic literature studies about software ecosystems”, ACM Int. Conf. Proceeding Ser., 2018, pp. 910–918. [12] Barbosa O. and Alves C. “A Systematic Mapping Study on Software Ecosystems through a Three-dimensional Perspective”, in Software Ecosystems: Analyzing and Managing Business Networks in the Software Industry, Edward Elgar Publishing, 2013, pp. 59–81. [13] Fotrousi F., FrickerS. A., Fiedler M. and Le-Gall F. “KPIs for Software Ecosystems: A Systematic Mapping Study”, in Lecture Notes in Business Information Processing, vol. 182 LNBIP, no. June, Springer, Cham, pp. 194–211, 2014. [14] Vegendla A., Duc A. N., Gao S. and Sindre G. “A Syste matic Mapping Study on Requirements Engineering in Software Ecosystems,” J. Inf. Technol. Res., vol. 11, no. 1, pp. 49–69, 2018. [15] A. De Lima Fontao, R. P. Dos Santos, and A. C. Dias-Neto, “Mobile Software Ecosystem (MSECO): A Systematic Mapping Study,” Proc. – Int. Comput. Softw. Appl. Conf., vol. 2, pp. 653–658, 2015. [16] A. (RWTH A. U. Wortmann and O. (Universite de R. Barais, “A Systematic Mapping Study on Modeling for Industry 4.0”, in 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS), 2017. [17] Zein S., Salleh N. and Grundy J. “A systematic mapping study of mobile application testing techniques”, J. Syst. Softw., vol. 117, no. Jul, pp. 334–356, 2016. [18] M. Petticrew and H. Roberts, “Systematic reviews – do they ‘work’ in informing decision-making around health inequalities?”, Heal. Econ. Policy Law, vol. 3, no. 2, pp. 197– 211, 2008. [19] Tsujimoto M., Kajikawa Y., Tomita J. and Matsumoto Y. , “A review of the ecosystem concept – Towards coherent ecosystem design”, Technol. Forecast. Soc. Change, vol. 136, no. December 2015, pp. 49–58, 2018. [20] Wieringa R., Maiden N., Mead N. and Rolland C. “Re quirements engineering paper classification and evaluation criteria: A proposal and a discussion”, Requir. Eng., vol. 11, no. 1, pp. 102–107, 2006. [21] Hevner A. R., March S. T., Park J. and Ram S. “Design science in information systems research”, MIS Q. Manag. Inf. Syst., vol. 28, no. 1, pp. 75–105, 2004. [22] Engström E. and Runeso nP. “Software product line testing – A systematic mapping study”, Inf. Softw. Technol., vol. 53, no. 1, pp. 2–13, 2011. [23] Salman A., I. Elhajj H., Chehab A. and Kayssi A. “DAIDS: An architecture for modular mobile IDS”, Proc. 2014 IEEE 28th Int. Conf. Adv. Inf. Netw. Appl. Work. IEEE WAINA 2014, no. May, pp. 328–333, 2014. [24] Armando A. et al., “Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module”, no. January 2015, pp. 41–49, 2015. [25] Feng D., Wang W., Liu J., Wang X., Zhang X. and Han Z. “Exploring Permission-Induced Risk in Android Appli cations for Malicious Application Detection”, IEEE Trans. Inf. Forensics Secur., vol. 9, no. 11, pp. 1869–1882, 2014. [26] Russello G., Jimenez A. B., Naderi H. and W. van der Mark, “FireDroid”, pp. 319–328, 2014. [27] Ando R., Takano Y. and Miwa S. “An empirical study of third party APK’s URL using scriptable API and fast identifier specific filter”, 2017 9th IEEE Int. Conf. Commun. Softw. Networks, ICCSN 2017, vol. 2017–Janua, pp. 1501–1506, 2017. [28] Choliy A., Li F. and Gao T. “Obfuscating function call topography to test structural malware detection against evasion attacks,” 2017 Int. Conf. Comput. Netw. Commun. ICNC 2017, pp. 808–813, 2017. [29] Li W., Ge J. and Dai G. “Detecting Malware for Android Platform: An SVM-Based Approach,” Proc. – 2nd IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2015 – IEEE Int. Symp. Smart Cloud, IEEE SSC 2015, no. January, pp. 464–469, 2016. [30] Ho T.-H., Dean D., Gu X. and Enck W. “PREC: Practical Root Exploit Containment for Android Devices”, Proc. 4th ACM Conf. Data Appl. Secur. Priv., pp. 187–198, 2014. [31] Yang W., Li J., Zhang Y., Li Y., J. Shu, and D. Gu, “APKLancet”, no. June 2014, pp. 483–494, 2014. [32] Hu W., Octeau D., McDaniel P. D. and Liu P. “Duet: Library Integrity Verification for Android Applications”, Proc. 2014 ACM Conf. Secur. Priv. Wirel. Mob. networks – WiSec ’14, pp. 141–152, 2014. [33] Martín A., Menéndez H. D., and Camacho D. “MOCDroid: multi-objective evolutionary classifier for Android malware detection”, Soft Comput., vol. 21, no. 24, pp. 7405–7415, 2017. [34] Oberoi S., Song W. and Youssef A. M. “AndroSAT: Security Analysis Tool for Android applications”, Secur. 2014 – 8th Int. Conf. Emerg. Secur. Information, Syst. Technol., no. c, pp. 124–131, 2014. [35] Bai G. et al., “Towards Model Checking Android Appli cations”, IEEE Trans. Softw. Eng., vol. 44, no. 6, pp. 595– 612, 2018. [36] Onwuzurike L. , Almeida M., Mariconti E., Blackburn J., Stringhini G. and E. De Cristofaro. “A Family of Droids Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis”, 2018 16th Annu. Conf. Privacy, Secur. Trust. PST 2018, no. Pst, 2018. [37] Li L et al. “On Locating Malicious Code in Piggybacked Android Apps”, J. Comput. Sci. Technol., vol. 32, no. 6, pp. 1108–1124, 2017. [38] Sarwar G. and Mehani O. “On the Effectiveness of Dy namic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices”, no. July, pp. 461–468, 2013. [39] R. Johnson, Z. Wang, A. Stavrou, and J. Voas, “Exposing software security and availability risks for commercial mobile devices”, Proc. – Annu. Reliab. Maintainab. Symp., 2013. [40] M. Ghorbanzadeh, Y. Chen, Z. Ma, T. C. Clancy, and R. McGwier, “A neural network approach to category validation of Android applications”, 2013 Int. Conf. Comput. Netw. Commun. ICNC 2013, no. June 2015, pp. 740–744, 2013. [41] Min L. X. and Cao Q. H. “Runtime-Based Behavior Dynamic Analysis System for Android Malware Detection”, Adv. Mater. Res., vol. 756–759, no. Iccia, pp. 2220–2225, 2013. [42] Lai G.-H., Lee Y.-H., Chu T.-H. and Cheng T.-H. “A Struc ture Similarity-based Approach to Malicious Android App Detection,” Pacis 2015 Proc., 2015. [43] Han Z. Xinhui; Ding, Yijing; Wang, Dongqi; Li, Tonghin; Ye. “Android malicious AD threat analysis and detection techniques”. [44] Hamed A., H. Kaffel-Ben Ayed, and Machfar D. “Assessment for Android apps permissions a proactive approach toward privacy risk”, 2017 13th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2017, no. October, pp. 1465– 1470, 2017. [45] Li M. et al. “Large-scale Third-party Library Detection in Android Markets”. [46] Siboni S., Sachidananda V., Shabtai A. and Elovici Y. “Security Testbed for the Internet of Things”, 2016. [47] Nobakht M., Sui Y., Seneviratne A. and Hu W. “Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks”, Proc. – 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, pp. 533–538, 2018. [48] Hernández-Serrano J. et al. “On the road to secure and privacy-preserving IoT ecosystems,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10218 LNCS, pp. 107–122, 2017. [49] Jung J. H., Kim J. Y., Lee H. C., and Yi J. H. “Re packaging attack on android banking applications and its countermeasures”, Wirel. Pers. Commun., vol. 73, no. 4, pp. 1421–1437, 2013. [50] Cho J., Cho G. and Kim H. “Keyboard or keylogger?: A security analysis of third-party keyboards on Android,” 2015 13th Annu. Conf. Privacy, Secur. Trust. PST 2015, pp. 173–176, 2015. [51] Anthi E and Theodorakopoulos G. “Sensitive data in smartphone applications: Where does it go? Can it be intercepted?”, Lect. Notes Inst. Comput. Sci. Soc. Tele commun. Eng. LNICST, vol. 239, pp. 301–319, 2018. [52] Faria K. A. C., E. N. de A. Freitas, and Vincenzi A. M. R. “Collaborative economy for testing cost reduction on Android ecosystem,” no. December, pp. 11–18, 2017. [53] Zhauniarovich Y., Philippov A., Gadyatskaya O., Crispo B. and Massacci F. “Towards black box testing of android apps,” Proc. - 10th Int. Conf. Availability, Reliab. Secur. ARES 2015, no. November, pp. 501–510, 2015. [54] Deka B., Huang Z., Franzen C., Nichols J., Li Y. and Kumar R. “Zipt”, pp. 727–736, 2017. [55] Anisetti M., Ardagna C., Damiani E., and Gaudenzi F. “A semi-automatic and trustworthy scheme for continuous cloud service certification”, IEEE Trans. Serv. Comput., vol. 1374, no. c, pp. 1–1, 2017. [56] Immonen A., Ovaska E. and Paaso T. “Towards certified open data in digital service ecosystems”, Softw. Qual. J., vol. 26, no. 4, pp. 1257–1297, 2018. [57] Falcone Y., Currea S. and Jaber M. “Runtime verification and enforcement for android applications with RV droid,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7687 LNCS, pp. 88–95, 2013. [58] Avancini A. and Ceccato M. “Security testing of the communication among Android applications”, 2013 8th Int. Work. Autom. Softw. Test, AST 2013 – Proc., no. November 2017, pp. 57–63, 2013. [59] Antão L., Pinto R., Reis J. and Gonçalves G. “Require ments for testing and validating the industrial internet of things”, Proc. – 2018 IEEE 11th Int. Conf. Softw. Testing, Verif. Valid. Work. ICSTW 2018, no. April, pp. 110–115, 2018. [60] Cattoni A. F. et al. “An end-to-end testing ecosystem for 5G the TRIANGLE testing house test bed”, J. Green Eng., vol. 6, no. 3, pp. 285–316, 2016. [61] Gazzola L., Mariani L., Pastore F. and Pezze M. “An Exploratory Study of Field Failures”, Proc. – Int. Symp. Softw. Reliab. Eng. ISSRE, vol. 2017-Octob, pp. 67–77, 2017. [62] Thorve S., Sreshtha C. and Meng N. “An empirical study of flaky tests in android apps”, Proc. 2018 IEEE Int. Conf. Softw. Maint. Evol. ICSME 2018, pp. 534–538, 2018. [63] Hyrynsalmi S., Seppänen M. and Suominen A. “Sources of value in application ecosystems”, J. Syst. Softw., vol. 96, no. October, pp. 61–72, 2014. [64] Benlian A., Hilkert D. and Hess T. “How open is this platform? The meaning and measurement of platform openness from the complementors’ perspective”, J. Inf. Technol., vol. 30, no. 3, pp. 209–228, 2015. [65] Colombo-Mendoza L. O., Alor-Hernández G., Rodríguez González A. and Valencia-García R. “MobiCloUP!: A PaaS for cloud services-based mobile applications”, Autom. Softw. Eng., vol. 21, no. 3, pp. 391–437, 2014. [66] Stritzke C., Priesterjahn C. and Gutiérrez P. A. A. “To wards a Method for End-to-End SDN App Deve lopment”, Proc. – Eur. Work. Softw. Defin. Networks, EWSDN, pp. 107–108, 2015. [67] Song M. “Supporting Effective Reuse and Safe Evolution in Metadata-Driven Software Development”, 2013. [68] Bidargaddi N. , Y. Van Kasteren, Musiat P. and Kidd M. “Developing a third-party analytics application using Australia’s national personal health records system: Case study”, J. Med. Internet Res., vol. 20, no. 4, pp. 1–17, 2018. [69] Cabral I., Espadinha-Cruz P., Grilo A., Gonçalves-Coelho A. and Mourão A. “A methodology for designing an intero perable industrial ecosystems, using the axiomatic design theory”, IEEE Int. Conf. Ind. Eng. Eng. Manag., 2014, pp. 1324–1328. [70] Arjunan P., Batra N., Choi H. and Singh A. “SensorAct: A Privacy and Security Aware Federated Middleware for Building Management”, Proc. in BuildSys, 2012, pp. 80–87. [71] Tiwari N. M., Upadhyaya G., Nguyen H. A. and Rajan H. “Candoia: A Platform for Building and Sharing Mining Software Repositories Tools as Apps”, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR), Buenos Aires, 2017, pp. 53–63, doi: 10.1109/MSR.2017.56. [72] Y. Yan Wang and Atanas Rountev. “Who changed you? obfuscator identification for Android”, Proc. in MOBI LESoft, 2017, pp. 154–164, doi:https://doi.org/10.1109/ MOBILESoft.2017.18 . [73] Ahmad W., Kästner C., Sunshine J. and Aldrich J. “Inter-app communication in Android”, 2016, pp. 177–188. [74] Apple Inc. “iOS Security iOS 12”, White Paper, no. September, 2018, p. 93. [75] “The Step-By-Step Guide to App Store Submission and Optimization”, Clearbridge Mobile, 2015. [76] Apple, “iOS Lifecycle Management Contents”, 2017, pp. 1–18. [77] Shimagaki J., Kamei Y., Ubayashi N. and Hindle A., “Auto matic topic classification of test cases using text mining at an Android smartphone vendor”, 2018, pp. 1–10.
dc.subjectindustrial applications, industrial ecosys tems mapping, IoT, mapping study, quality assurance, testing, verification, validation , third party
dc.titleSystematic mapping study on verification and validation of industrial third-party IoT applications
dc.typeArticle

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
031-045.pdf
Size:
975.59 KB
Format:
Adobe Portable Document Format