<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://c4d.lias-lab.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ait</id>
	<title>COMP4DRONES - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://c4d.lias-lab.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ait"/>
	<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php/Special:Contributions/Ait"/>
	<updated>2026-04-07T00:45:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=1165</id>
		<title>WP6-02</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=1165"/>
		<updated>2023-11-27T12:31:05Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ThreatGet – Post- / Precondition =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-02&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, Enterprise Architect, SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Threat Analysis and Risk Management.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	||  SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Threat Analysis and Risk Assesment, Report&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4 (for application to Drone Systems)&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://www.threatget.com/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
ThreatGet offers an automated security (threat) analysis and supports risk managements. This is based on a model of the system and a database of relevant threats, weaknesses and vulnerabilities. The system model is analyzed, potential threats are identified and guidance for threat treatment is provided. For certification the tool offers a report function.&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
The AIT Security Analysis Tool can be used as analysis tool to identify security issues in a design and verification toolchain and also to provide input for security testing and analysis. An overview of interactions is shown in  in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_Placement_and_Interaction_Toolchain.png|600px|thumb|frame|center| Placement and Interaction of AIT Security Analysis tool in toolchain]]&lt;br /&gt;
&lt;br /&gt;
The model in the tool can be based either on a informal description of a system (e.g. developed from scratch) or based on an already existing system model (e.g. formal description). In the case of a formal description there is the potential to ensure traceability between the existing model and the model for the security analysis. Outcome of the analysis are:&lt;br /&gt;
&lt;br /&gt;
# A list of potential risks and attacks, where likelihood and impact can be rated to enable risk assessment.&lt;br /&gt;
# Based on the risks, security measures can be assigned and used as input for further design and development. Either the security measures can be directly defined in the model, or a requirement document can be defined.&lt;br /&gt;
# Identified risks and attacks can also be used as input for security testing and verification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In context of Comp4Drones ThreatGet focuses on an analysis of potential drone usage scenarios and architectures to identify potential security risks and evaluate mitigation measures. For this AIT developed a drone-specific Toolbox. The Toolbox consists of a set of Drone and UAV-domain specific elements, which are divided into generic elements and more specific sub-elements as shown in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_UAV_Toolbox.png|600px|thumb|frame|center| UAV Toolbox]]&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
While the AIT Security Analysis utilizes an enhanced Dataflow Diagram / Architecture Model for the threat analysis, there is a possibility to connect this model with traces to an SysML Model and interact with other SysML based Tools. In addition to that risk identified and requirements defined can be exchanged with requirement management tools, e.g. Excel, XML, RIF/ReqIF. An asset driven Cybersecurity Workflow [https://c4d.lias-lab.fr/index.php/WP6-01 AIT Workflow] was developed for extended analysis options for the system models.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=661</id>
		<title>WP6-02</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=661"/>
		<updated>2022-10-14T07:28:24Z</updated>

		<summary type="html">&lt;p&gt;Ait: Created page with &amp;quot;= ThreatGet – Post- / Precondition = {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP6-02 |- |   Contributor	|| AIT |- |   Levels	|| Tool |- |   Require	|| Windows, Enterprise Architect, SysML model |- |   Provide	|| Threat Analysis and Risk Management. |- |   Input	||  SysML model |- |   Output	|| Threat Analysis and Risk Assesment, Report |- |   C4D tooling		|| n.a. |- |   TRL		|| 4 (for application to Drone Systems) |- |   License || Commercial, Non-Commercial, Academic |- |   URL...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ThreatGet – Post- / Precondition =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-02&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, Enterprise Architect, SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Threat Analysis and Risk Management.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	||  SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Threat Analysis and Risk Assesment, Report&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4 (for application to Drone Systems)&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://www.threatget.com/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
ThreatGet offers an automated security (threat) analysis and supports risk managements. This is based on a model of the system and a database of relevant threats, weaknesses and vulnerabilities. The system model is analyzed, potential threats are identified and guidance for threat treatment is provided. For certification the tool offers a report function.&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
The AIT Security Analysis Tool can be used as analysis tool to identify security issues in a design and verification toolchain and also to provide input for security testing and analysis. An overview of interactions is shown in  in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_Placement_and_Interaction_Toolchain.png|600px|thumb|frame|center| Placement and Interaction of AIT Security Analysis tool in toolchain]]&lt;br /&gt;
&lt;br /&gt;
The model in the tool can be based either on a informal description of a system (e.g. developed from scratch) or based on an already existing system model (e.g. formal description). In the case of a formal description there is the potential to ensure traceability between the existing model and the model for the security analysis. Outcome of the analysis are:&lt;br /&gt;
&lt;br /&gt;
# A list of potential risks and attacks, where likelihood and impact can be rated to enable risk assessment.&lt;br /&gt;
# Based on the risks, security measures can be assigned and used as input for further design and development. Either the security measures can be directly defined in the model, or a requirement document can be defined.&lt;br /&gt;
# Identified risks and attacks can also be used as input for security testing and verification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In context of Comp4Drones ThreatGet focuses on an analysis of potential drone usage scenarios and architectures to identify potential security risks and evaluate mitigation measures. For this AIT developed a drone-specific Toolbox. The Toolbox consists of a set of Drone and UAV-domain specific elements, which are divided into generic elements and more specific sub-elements as shown in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_UAV_Toolbox.png|600px|thumb|frame|center| UAV Toolbox]]&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
While the AIT Security Analysis utilizes an enhanced Dataflow Diagram / Architecture Model for the threat analysis, there is a possibility to connect this model with traces to an SysML Model and interact with other SysML based Tools. In addition to that risk identified and requirements defined can be exchanged with requirement management tools, e.g. Excel, XML, RIF/ReqIF. An asset driven Cybersecurity Workflow [https://c4d.lias-lab.fr/index.php/WP6-03 AIT Workflow] was developed for extended analysis options for the system models.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:AIT_TG_Placement_and_Interaction_Toolchain.png&amp;diff=660</id>
		<title>File:AIT TG Placement and Interaction Toolchain.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:AIT_TG_Placement_and_Interaction_Toolchain.png&amp;diff=660"/>
		<updated>2022-10-14T07:25:35Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:AIT_UAV_Toolbox.png&amp;diff=659</id>
		<title>File:AIT UAV Toolbox.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:AIT_UAV_Toolbox.png&amp;diff=659"/>
		<updated>2022-10-14T07:08:56Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=558</id>
		<title>WP6-01</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=558"/>
		<updated>2022-10-10T13:22:15Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Figure 11: Asset driven Cybersecurity Workflow */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Asset driven Cybersecurity Workflow =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-01&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, [https://c4d.lias-lab.fr/index.php/WP6-02 AIT Security Analysis Tool]&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Asset driven cybersecurity workflow.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
An asset-driven analysis approach was introduced in the AIT Security Analysis Tool, the figure below shows the resulting cybersecurity workflow.&lt;br /&gt;
[[File:AIT_asset_workflow.png|600px|thumb|frame|center| Asset driven Cybersecurity Workflow]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
The Asset driven Cybersecurity Workflow as part of the [https://c4d.lias-lab.fr/index.php/WP6-02 AIT Security Analysis Tool] offers extended analysis options for the SysML models.&lt;br /&gt;
[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:AIT_TG_toolchain.png&amp;diff=556</id>
		<title>File:AIT TG toolchain.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:AIT_TG_toolchain.png&amp;diff=556"/>
		<updated>2022-10-10T12:59:29Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:AIT_asset_workflow.png&amp;diff=555</id>
		<title>File:AIT asset workflow.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:AIT_asset_workflow.png&amp;diff=555"/>
		<updated>2022-10-10T12:59:18Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=554</id>
		<title>WP6-01</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=554"/>
		<updated>2022-10-10T12:58:47Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Detailed Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Figure 11: Asset driven Cybersecurity Workflow =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-01&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, ThreatGet &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	||Asset driven cybersecurity workflow.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
&lt;br /&gt;
https://c4d.lias-lab.fr/index.php/WP6-02&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=553</id>
		<title>WP6-01</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-01&amp;diff=553"/>
		<updated>2022-10-10T12:57:56Z</updated>

		<summary type="html">&lt;p&gt;Ait: Created page with &amp;quot;= Figure 11: Asset driven Cybersecurity Workflow = {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP6-01 |- |   Contributor	|| AIT |- |   Levels	|| Tool |- |   Require	|| Windows, ThreatGet  |- |   Provide	||Asset driven cybersecurity workflow. |}  == Detailed Description ==  == Interoperability with other C4D tools ==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Figure 11: Asset driven Cybersecurity Workflow =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-01&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, ThreatGet &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	||Asset driven cybersecurity workflow.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6_Tools_Table&amp;diff=552</id>
		<title>WP6 Tools Table</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6_Tools_Table&amp;diff=552"/>
		<updated>2022-10-10T12:53:29Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Tool Name&lt;br /&gt;
! ID&lt;br /&gt;
! Partner&lt;br /&gt;
! User Requirements&lt;br /&gt;
! Acceptance Testing&lt;br /&gt;
! Data Analytics&lt;br /&gt;
! Mission Planning&lt;br /&gt;
! System Requirements&lt;br /&gt;
! Design&lt;br /&gt;
! Implementation&lt;br /&gt;
! Integration&lt;br /&gt;
! Testing (Verification)&lt;br /&gt;
! Validation&lt;br /&gt;
! IPR&lt;br /&gt;
! Initial TRL&lt;br /&gt;
! Expected TRL&lt;br /&gt;
! Other&lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| '''System Modelling and Code Generation Tools'''&lt;br /&gt;
|-&lt;br /&gt;
| Modelling &amp;amp; Simulation Tool&lt;br /&gt;
|[[WP6-06]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source BSD-3&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Mission design and optimization&lt;br /&gt;
|[[WP6-07]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| CL&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| OODK&lt;br /&gt;
|[[WP6-13]]&lt;br /&gt;
| UNIMORE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source (BSD-Like)&lt;br /&gt;
| 4&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MDC&lt;br /&gt;
|[[WP6-15]]&lt;br /&gt;
| UNISS&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source BSD-3&lt;br /&gt;
| 3&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| HEPSYCODE&lt;br /&gt;
|[[WP6-17]]&lt;br /&gt;
| UNIVAQ&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| ESDE&lt;br /&gt;
|[[WP6-20]]&lt;br /&gt;
| ACORDE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 1-3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Papyrus for Robotics&lt;br /&gt;
|[[WP6-24]]&lt;br /&gt;
| CEA&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Eclipse (EPL v2.0)&lt;br /&gt;
| 3-4&lt;br /&gt;
| 5-6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| S3D&lt;br /&gt;
|[[WP6-25]]&lt;br /&gt;
| UNICAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
Academic Licensing for research&lt;br /&gt;
End User Licensing for commercial use &lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| DronePort design tool&lt;br /&gt;
|[[WP6-27]]&lt;br /&gt;
| SM&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open source&lt;br /&gt;
| 1&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| System Validation and Verification Tools&lt;br /&gt;
|-&lt;br /&gt;
| Workflow&lt;br /&gt;
|[[WP6-01]]&lt;br /&gt;
| AIT&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MoMuT Protocol Testing&lt;br /&gt;
|[[WP6-03]]&lt;br /&gt;
| AIT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Proprietary; Academic&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Testing Tool Set&lt;br /&gt;
|[[WP6-04]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source (BSD-Like)&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| DronePort Simulation Extensions for Gazebo&lt;br /&gt;
|[[WP6-09]]&lt;br /&gt;
| UWB&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Open Source&lt;br /&gt;
| 2&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Paparazzi UAV&lt;br /&gt;
|[[WP6-10]]&lt;br /&gt;
| ENAC&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| GPLv2 LGPLv2&lt;br /&gt;
| 6&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| AirMPL&lt;br /&gt;
|[[WP6-14]]&lt;br /&gt;
| UNISANNIO&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Open source&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SAGE&lt;br /&gt;
|[[WP6-16]]&lt;br /&gt;
| UNISS&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| LGPL v.3&lt;br /&gt;
| 2/3&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SelfTestTool&lt;br /&gt;
|[[WP6-22]]&lt;br /&gt;
| IKERLAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| AsyncCommsTool&lt;br /&gt;
|[[WP6-23]]&lt;br /&gt;
| IKERLAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 4&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Sherpa drone simulator&lt;br /&gt;
|[[WP6-28]]&lt;br /&gt;
| SHERPA&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Open source (Academic)&lt;br /&gt;
| 3&lt;br /&gt;
| 3&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Framework and toolkit for validation of robustness of path management for multi-path communication system&lt;br /&gt;
|[[WP6-18]]&lt;br /&gt;
| ANYWI&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Framework and toolkit for validation of APIs for collection of connection metadata of multi-path communication system&lt;br /&gt;
|[[WP6-19]]&lt;br /&gt;
| ANIWY&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| System Analysis and Optimization Tools&lt;br /&gt;
|-&lt;br /&gt;
| ThreatGet – Post- / Precondition&lt;br /&gt;
|[[WP6-02]]&lt;br /&gt;
| AIT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Safety Analysis Tool&lt;br /&gt;
|[[WP6-08]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 4&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Big Data analytics tool&lt;br /&gt;
|[[WP6-05]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 1&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Simcenter Amesim&lt;br /&gt;
|[[WP6-11]]&lt;br /&gt;
| Siemens&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 8&lt;br /&gt;
| 9&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MoSART&lt;br /&gt;
|[[WP6-12]]&lt;br /&gt;
| ENSMA&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| IPS-MAF&lt;br /&gt;
|[[WP6-21]]&lt;br /&gt;
| ACORDE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 1&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SoSIM&lt;br /&gt;
|[[WP6-26]]&lt;br /&gt;
| UNICAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| Academic Licensing for research&lt;br /&gt;
End User Licensing for commercial use&lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| ROS1 &amp;amp; ROS2 infrastructure/dev-ops&lt;br /&gt;
|[[WP6-32]]&lt;br /&gt;
| ALM&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| BSD&lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Cloud-based simulation environment&lt;br /&gt;
|[[WP6-33]]&lt;br /&gt;
| ALM&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| T.B.D. Mainly Open-Source (Apache 2.0)&lt;br /&gt;
| 4&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SATB&lt;br /&gt;
|[[WP6-29]]&lt;br /&gt;
| ALTRAN&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| . &lt;br /&gt;
| 0&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| e-Handbook&lt;br /&gt;
|[[WP6-30]]&lt;br /&gt;
| ALTRAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| .&lt;br /&gt;
| 0&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| HEPSIM2&lt;br /&gt;
| [[WP6-34]]&lt;br /&gt;
| UNIVAQ&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=537</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=537"/>
		<updated>2022-10-04T14:00:25Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://momut.org/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model based testing tool addressing functional and non-functional test-case generation from behaviour models. Non-functional aspects include safety invariants and robustness testing ([1][2][3][4]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). &lt;br /&gt;
&lt;br /&gt;
For functional test- case generation, it uses mutation-based test- case generation, where a behaviour model is slightly changed (= mutated) and test cases are searched that would allow to discriminate the original and the mutant by the outside behaviour. The change might e.g. be a modified operator or a literal used. The concept is sketched in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_tcg.png|600px|thumb|frame|center| Mutation based test case generation.]]&lt;br /&gt;
&lt;br /&gt;
Non-functional aspects that can be addressed are:&lt;br /&gt;
* safety invariants (by checking condition during exploration)&lt;br /&gt;
* robustness (via smart fuzzing on top of generated tests)&lt;br /&gt;
* performance (if a learned cost predictor can be derived)&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In the project, AIT  improved support for testing communication protocols driven by the needs of evaluating the correctness of an implementation of a key exchange protocol.&lt;br /&gt;
The toolchain proposed by AIT to address UC5 is a model-based test case generation framework, whereby we create a model of the protocol to test, run the model-based mutation testing tool and then use the test to verify the protocol implementation. The main tools involved are Papyrus for the modelling, MoMuT for the test-case generation from the model and finally a test-adapter to run the tests against the protocol implementation.&lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_toolchain.png|600px|thumb|frame|center| MoMuT toolchain]]&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_Inperoperability.png|600px|thumb|frame|center| MoMuT tool interoperability graph]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:MoMuT_toolchain.png&amp;diff=536</id>
		<title>File:MoMuT toolchain.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:MoMuT_toolchain.png&amp;diff=536"/>
		<updated>2022-10-04T13:52:20Z</updated>

		<summary type="html">&lt;p&gt;Ait: Ait uploaded a new version of File:MoMuT toolchain.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=535</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=535"/>
		<updated>2022-10-04T13:50:55Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://momut.org/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages) ([1][2][3][4]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). &lt;br /&gt;
&lt;br /&gt;
For functional test- case generation, it uses mutation-based test- case generation, where a behaviour model is slightly changed (= mutated) and test cases are searched that would allow to discriminate the original and the mutant by the outside behaviour. The change might e.g. be a modified operator or a literal used. The concept is sketched in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_tcg.png|600px|thumb|frame|center| Mutation based test case generation.]]&lt;br /&gt;
&lt;br /&gt;
Non-functional aspects that can be addressed are:&lt;br /&gt;
* safety invariants (by checking condition during exploration)&lt;br /&gt;
* robustness (via smart fuzzing on top of generated tests)&lt;br /&gt;
* performance (if a learned cost predictor can be derived)&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In the project, AIT  improved support for testing communication protocols driven by the needs of evaluating the correctness of an implementation of a key exchange protocol.&lt;br /&gt;
The toolchain proposed by AIT to address UC5 is a model-based test case generation framework, whereby we create a model of the protocol to test, run the model-based mutation testing tool and then use the test to verify the protocol implementation. The main tools involved are Papyrus for the modelling, MoMuT for the test-case generation from the model and finally a test-adapter to run the tests against the protocol implementation.&lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_toolchain.png|600px|thumb|frame|center| MoMuT toolchain]]&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_Inperoperability.png|600px|thumb|frame|center| MoMuT tool interoperability graph]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:MoMuT_toolchain.png&amp;diff=534</id>
		<title>File:MoMuT toolchain.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:MoMuT_toolchain.png&amp;diff=534"/>
		<updated>2022-10-04T13:45:28Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=533</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=533"/>
		<updated>2022-10-04T13:45:05Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://momut.org/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). ([1][2][3][4]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). &lt;br /&gt;
&lt;br /&gt;
For functional test- case generation, it uses mutation-based test- case generation, where a behaviour model is slightly changed (= mutated) and test cases are searched that would allow to discriminate the original and the mutant by the outside behaviour. The change might e.g. be a modified operator or a literal used. The concept is sketched in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_tcg.png|600px|thumb|frame|center| Mutation based test case generation.]]&lt;br /&gt;
&lt;br /&gt;
Non-functional aspects that can be addressed are:&lt;br /&gt;
* safety invariants (by checking condition during exploration)&lt;br /&gt;
* robustness (via smart fuzzing on top of generated tests)&lt;br /&gt;
* performance (if a learned cost predictor can be derived)&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In the project, we will improve support for testing communication protocols driven by the needs of evaluating the correctness of an implementation of a key exchange protocol.&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_Inperoperability.png|600px|thumb|frame|center| MoMuT tool interoperability graph]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=532</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=532"/>
		<updated>2022-10-04T13:40:36Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Detailed Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://momut.org/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). ([1][2][3][4]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). &lt;br /&gt;
&lt;br /&gt;
For functional test- case generation, it uses mutation-based test- case generation, where a behaviour model is slightly changed (= mutated) and test cases are searched that would allow to discriminate the original and the mutant by the outside behaviour. The change might e.g. be a modified operator or a literal used. The concept is sketched in the following figure.&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_Inperoperability.png|600px|thumb|frame|center| MoMuT tool interoperability graph]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:MoMuT_tcg.png&amp;diff=531</id>
		<title>File:MoMuT tcg.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:MoMuT_tcg.png&amp;diff=531"/>
		<updated>2022-10-04T13:39:22Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=530</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=530"/>
		<updated>2022-10-04T13:18:42Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://momut.org/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). ([1][2][3][4]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
[[File:MoMuT_Inperoperability.png|600px|thumb|frame|center| MoMuT tool interoperability graph]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:MoMuT_Inperoperability.png&amp;diff=529</id>
		<title>File:MoMuT Inperoperability.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:MoMuT_Inperoperability.png&amp;diff=529"/>
		<updated>2022-10-04T13:14:54Z</updated>

		<summary type="html">&lt;p&gt;Ait: MoMuT tool interoperability graph&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
MoMuT tool interoperability graph&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=528</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=528"/>
		<updated>2022-10-04T13:14:11Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MoMuT is a model-based testing tool addressing functional and non-functional test-case generation from behaviour models. It can work from several different input modelling languages (e.g. UML and domain specific languages). ([1][2][3][4] [5]).&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
Models to be used as input for MoMuT can be in different formats and formalisms e.g. UML (in Eclipse Papyrus or SparxSystems Enterprise Architect format), a MoMuT specific textual format or a domain specific language. If Papyrus UML is used, this should be compatible/integrable with models for Papyrus4Robotics. This could also lead to interoperation with the security analysis tool. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
[1] MoMuT::UML model-based mutation testing for UML. Aichernig, B, et al. 2015. 2015 ieee 8th international conference on Software testing, verification and validation (icst). p. 1-8.&lt;br /&gt;
&lt;br /&gt;
[2] Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems. Krenn, W, Schlick, R and Aichernig, B. K. Berlin, Heidelberg : s.n., 2010. Proceedings of the 8th international conference on formal methods for components and objects. pp. 186–207.&lt;br /&gt;
&lt;br /&gt;
[3] Fellner, Andreas, Tarrach, Thorsten and Weissenbacher, Georg. Language Inclusion for Finite Prime Event Structures. VMCAI. s.l. : Springer, 2020, Vol. 11990, pp. 314-336.&lt;br /&gt;
&lt;br /&gt;
[4] Fellner, Andreas , et al. Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. ACM Trans. Embed. Comput. Syst. 2019.&lt;br /&gt;
&lt;br /&gt;
[5] https://momut.org/&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=527</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=527"/>
		<updated>2022-10-04T13:01:28Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Model-based Mutation Testing - Protocol Testing ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=526</id>
		<title>WP6-03</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-03&amp;diff=526"/>
		<updated>2022-10-04T12:54:13Z</updated>

		<summary type="html">&lt;p&gt;Ait: Created page with &amp;quot;= Model-based Mutation Testing - Protocol Testing {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP6-MoMuT |- |   Contributor	|| AIT |- |   Levels	|| Tool |- |   Require	|| Linux, Windows, UML/Event-B/OOAS model |- |   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite. |- |   Input	|| UML/Event-B/OOAS model, testinterface |- |   Output	|| Test suite |- |   C4D tooling		|| n.a. |- |   TRL		|| 4 |}&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Model-based Mutation Testing - Protocol Testing&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-MoMuT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Linux, Windows, UML/Event-B/OOAS model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Generation of a set of test cases and provides feedback about the quality of the existing test suite.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| UML/Event-B/OOAS model, testinterface&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Test suite&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6_Tools_Table&amp;diff=525</id>
		<title>WP6 Tools Table</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6_Tools_Table&amp;diff=525"/>
		<updated>2022-10-04T12:43:46Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Tool Name&lt;br /&gt;
! ID&lt;br /&gt;
! Partner&lt;br /&gt;
! User Requirements&lt;br /&gt;
! Acceptance Testing&lt;br /&gt;
! Data Analytics&lt;br /&gt;
! Mission Planning&lt;br /&gt;
! System Requirements&lt;br /&gt;
! Design&lt;br /&gt;
! Implementation&lt;br /&gt;
! Integration&lt;br /&gt;
! Testing (Verification)&lt;br /&gt;
! Validation&lt;br /&gt;
! IPR&lt;br /&gt;
! Initial TRL&lt;br /&gt;
! Expected TRL&lt;br /&gt;
! Other&lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| '''System Modelling and Code Generation Tools'''&lt;br /&gt;
|-&lt;br /&gt;
| Modelling &amp;amp; Simulation Tool&lt;br /&gt;
|[[WP6-06]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source BSD-3&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Mission design and optimization&lt;br /&gt;
|[[WP6-07]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| CL&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| OODK&lt;br /&gt;
|[[WP6-13]]&lt;br /&gt;
| UNIMORE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source (BSD-Like)&lt;br /&gt;
| 4&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MDC&lt;br /&gt;
|[[WP6-15]]&lt;br /&gt;
| UNISS&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source BSD-3&lt;br /&gt;
| 3&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| HEPSYCODE&lt;br /&gt;
|[[WP6-17]]&lt;br /&gt;
| UNIVAQ&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| ESDE&lt;br /&gt;
|[[WP6-20]]&lt;br /&gt;
| ACORDE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 1-3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Papyrus for Robotics&lt;br /&gt;
|[[WP6-24]]&lt;br /&gt;
| CEA&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Eclipse (EPL v2.0)&lt;br /&gt;
| 3-4&lt;br /&gt;
| 5-6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| S3D&lt;br /&gt;
|[[WP6-25]]&lt;br /&gt;
| UNICAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
Academic Licensing for research&lt;br /&gt;
End User Licensing for commercial use &lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| DronePort design tool&lt;br /&gt;
|[[WP6-27]]&lt;br /&gt;
| SM&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open source&lt;br /&gt;
| 1&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| System Validation and Verification Tools&lt;br /&gt;
|-&lt;br /&gt;
| Workflow Engine&lt;br /&gt;
|[[WP6-01]]&lt;br /&gt;
| AIT&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MoMuT Protocol Testing&lt;br /&gt;
|[[WP6-03]]&lt;br /&gt;
| AIT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Proprietary; Academic&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Testing Tool Set&lt;br /&gt;
|[[WP6-04]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Open-Source (BSD-Like)&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| DronePort Simulation Extensions for Gazebo&lt;br /&gt;
|[[WP6-09]]&lt;br /&gt;
| UWB&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Open Source&lt;br /&gt;
| 2&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Paparazzi UAV&lt;br /&gt;
|[[WP6-10]]&lt;br /&gt;
| ENAC&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| GPLv2 LGPLv2&lt;br /&gt;
| 6&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| AirMPL&lt;br /&gt;
|[[WP6-14]]&lt;br /&gt;
| UNISANNIO&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Open source&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SAGE&lt;br /&gt;
|[[WP6-16]]&lt;br /&gt;
| UNISS&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| LGPL v.3&lt;br /&gt;
| 2/3&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SelfTestTool&lt;br /&gt;
|[[WP6-22]]&lt;br /&gt;
| IKERLAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| AsyncCommsTool&lt;br /&gt;
|[[WP6-23]]&lt;br /&gt;
| IKERLAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 4&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Sherpa drone simulator&lt;br /&gt;
|[[WP6-28]]&lt;br /&gt;
| SHERPA&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Open source (Academic)&lt;br /&gt;
| 3&lt;br /&gt;
| 3&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Framework and toolkit for validation of robustness of path management for multi-path communication system&lt;br /&gt;
|[[WP6-18]]&lt;br /&gt;
| ANYWI&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Framework and toolkit for validation of APIs for collection of connection metadata of multi-path communication system&lt;br /&gt;
|[[WP6-19]]&lt;br /&gt;
| ANIWY&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 3&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
!style=&amp;quot;text-align: center;&amp;quot; colspan=&amp;quot;17&amp;quot;| System Analysis and Optimization Tools&lt;br /&gt;
|-&lt;br /&gt;
| ThreatGet – Post- / Precondition&lt;br /&gt;
|[[WP6-02]]&lt;br /&gt;
| AIT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Proprietary&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Safety Analysis Tool&lt;br /&gt;
|[[WP6-08]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 4&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Big Data analytics tool&lt;br /&gt;
|[[WP6-05]]&lt;br /&gt;
| BUT&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 1&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Simcenter Amesim&lt;br /&gt;
|[[WP6-11]]&lt;br /&gt;
| Siemens&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 8&lt;br /&gt;
| 9&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| MoSART&lt;br /&gt;
|[[WP6-12]]&lt;br /&gt;
| ENSMA&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| IPS-MAF&lt;br /&gt;
|[[WP6-21]]&lt;br /&gt;
| ACORDE&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| Proprietary&lt;br /&gt;
| 1&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SoSIM&lt;br /&gt;
|[[WP6-26]]&lt;br /&gt;
| UNICAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| Academic Licensing for research&lt;br /&gt;
End User Licensing for commercial use&lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| ROS1 &amp;amp; ROS2 infrastructure/dev-ops&lt;br /&gt;
|[[WP6-32]]&lt;br /&gt;
| ALM&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| BSD&lt;br /&gt;
| 5&lt;br /&gt;
| 6&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Cloud-based simulation environment&lt;br /&gt;
|[[WP6-33]]&lt;br /&gt;
| ALM&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| T.B.D. Mainly Open-Source (Apache 2.0)&lt;br /&gt;
| 4&lt;br /&gt;
| 5&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| SATB&lt;br /&gt;
|[[WP6-29]]&lt;br /&gt;
| ALTRAN&lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| . &lt;br /&gt;
| 0&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| e-Handbook&lt;br /&gt;
|[[WP6-30]]&lt;br /&gt;
| ALTRAN&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| .&lt;br /&gt;
| 0&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| HEPSIM2&lt;br /&gt;
| [[WP6-34]]&lt;br /&gt;
| UNIVAQ&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| X&lt;br /&gt;
| X&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Academic Licensing&lt;br /&gt;
| 2&lt;br /&gt;
| 4&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=377</id>
		<title>WP5-16-AIT</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=377"/>
		<updated>2022-07-19T09:32:32Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Cryptographic algorithms adapted for drones */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Cryptographic algorithms adapted for drones=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  Identifier || WP5-16-AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   License || Functional&lt;br /&gt;
|-&lt;br /&gt;
|   TRL|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requirements will at the same time provide strong security guarantees (like full forward secrecy). Another important focus will be to provide long-term security and in particular resilience to quantum computers, i.e., post-quantum security, and privacy protection of the entities involved in a communication. &lt;br /&gt;
|-&lt;br /&gt;
|   Key Enabling Technology || KET: Security — CATEGORY: U-Space Capabilities, KET: Network Centric Communications Systems — CATEGORY: System Functions &lt;br /&gt;
|-&lt;br /&gt;
|   U-Space Capabilities || “U1: Communication, navigation and surveillance” and “U3: U-space Advanced Services”. This component can be integrated and used by drone manufacturers for general remote communication, as well as V2I and V2V communications, since in the communication-layer the component is located below the standardized and commonly used “TLS” communication layer.&lt;br /&gt;
|-&lt;br /&gt;
|   System Functions || “Communication / Network Centric Communications”: The SW-component provides functionality for secure channel establishment to protect the confidentiality and integrity of messages between two communicating entities by means of a key exchange mechanism with strong security and privacy features. Moreover, with respect to entity authentication it enables unilateral or mutual authentication of communication partners within the secure channel establishment and additionally provides a means for privacy-friendly entity authentication. &lt;br /&gt;
|-&lt;br /&gt;
|   CD4 objectives (O), success criteria (SC), and measurable outcomes (MO) || O3 / SC3.1: Reduction of cybersecurity risks of drone-to-x communications, MO3.3: Mechanisms for secure communications&lt;br /&gt;
|-&lt;br /&gt;
|   Improvement || State-of-the-art cryptographic protocols do not provide low latency as well as strong security properties such as full forward secrecy at the same time. Currently, available protocols are no means to support privacy-friendly authentication. Moreover, they lack security in the face of powerful quantum computers. All these aspects are considered within this component, improving significantly over the state-of-the-art. &lt;br /&gt;
|-&lt;br /&gt;
| Task || T5.3 &lt;br /&gt;
|-&lt;br /&gt;
| Use Case || UC5 — Agriculture  &lt;br /&gt;
|-&lt;br /&gt;
| Demonstrator || D2 — Wine production &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Architecture context and interfaces =&lt;br /&gt;
&lt;br /&gt;
The AIT component does not represent a stand-alone module but can be viewed as being located within the “VehicleCom” and “GroundCom” modules, i.e., the modules in charge of the communication between vehicles or between vehicles and the ground station and adds security features to the communication (confidentiality, authenticity, privacy). &lt;br /&gt;
&lt;br /&gt;
[[File:wp5-16-ait.png|frame|Architecture context of the component WP5-16-AIT]]&lt;br /&gt;
&lt;br /&gt;
The component can be viewed as a collection of libraries implementing protocols (e.g., secure channel establishment with strong security or privacy-friendly entity authentication) and typically replaces or augments other existing cryptographic primitives (e.g., basic mechanisms in the transport layer security (TLS) protocol). It runs on the Vehicle (VehicleCom), where it is intended to be used together with the “Secure Element” (SE) module to provide stronger security features (i.e., realize secret key operations within the SE). It also runs on the GroundStation and in combination it is possible for the Vehicle and the GroundStation to establish a secure communication (confidential and authenticated).  &lt;br /&gt;
&lt;br /&gt;
The core features our component was focusing on can be summarized as follows: &lt;br /&gt;
&lt;br /&gt;
(Low-latency) Key-exchange protocols: Our key-exchange protocols to achieve low latency (zero round-trip time, 0-RTT) together with strong security properties are built upon so called puncturable encryption schemes (or key encapsulation mechanisms).  &lt;br /&gt;
&lt;br /&gt;
Privacy-preserving authentication: Depending on the required degree of privacy (only with respect to eavesdroppers or even communication partners like the base station), we focused on protocols either obtained from anonymous (authenticated) key-exchange protocols or primitives underlying anonymous attribute-based credentials or group signature schemes.&lt;br /&gt;
&lt;br /&gt;
=     Internals and technologies  = &lt;br /&gt;
For the implementation of our component, we require a few external libraries:  &lt;br /&gt;
&lt;br /&gt;
A pairing implementation, for which we rely on the popular and highly optimized open-source pairing library RELIC6. This choice is done for multiple reasons: (1) it includes implementation of currently recommended pairing-friendly curves such as BLS12-381, (2) includes optimizations for desktop and server CPUs as well as embedded CPUs such as ARM and AVR processors, and (3) allows to configure memory handling suitable for the target platform.  &lt;br /&gt;
&lt;br /&gt;
The pyrelic library7 which provides Python bindings for the popular and highly optimized open-source pairing library RELIC. &lt;br /&gt;
&lt;br /&gt;
OpenSSL8, as one of the most used libraries for TLS which also provides TLS 1.3 support.&lt;br /&gt;
&lt;br /&gt;
Our library that implements the secure channel establishment has finally been integrated into OpenSSL and our library for privacy-preserving authentication has been integrated into the pyrelic library. More details can be found in Deliverables D5.5 and D5.6.  &lt;br /&gt;
&lt;br /&gt;
As our evaluation platform we use a Raspberry Pi 3 Model B powered by a quad-core ARM Cortex-A53 1200 MHz processor and has 1 GB SDRAM.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=376</id>
		<title>WP5-16-AIT</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=376"/>
		<updated>2022-07-19T09:31:59Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Architecture context and interfaces */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Cryptographic algorithms adapted for drones=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  Identifier || WP5-16-AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   License || Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Expected TRL|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requirements will at the same time provide strong security guarantees (like full forward secrecy). Another important focus will be to provide long-term security and in particular resilience to quantum computers, i.e., post-quantum security, and privacy protection of the entities involved in a communication. &lt;br /&gt;
|-&lt;br /&gt;
|   Key Enabling Technology || KET: Security — CATEGORY: U-Space Capabilities, KET: Network Centric Communications Systems — CATEGORY: System Functions &lt;br /&gt;
|-&lt;br /&gt;
|   U-Space Capabilities || “U1: Communication, navigation and surveillance” and “U3: U-space Advanced Services”. This component can be integrated and used by drone manufacturers for general remote communication, as well as V2I and V2V communications, since in the communication-layer the component is located below the standardized and commonly used “TLS” communication layer.&lt;br /&gt;
|-&lt;br /&gt;
|   System Functions || “Communication / Network Centric Communications”: The SW-component provides functionality for secure channel establishment to protect the confidentiality and integrity of messages between two communicating entities by means of a key exchange mechanism with strong security and privacy features. Moreover, with respect to entity authentication it enables unilateral or mutual authentication of communication partners within the secure channel establishment and additionally provides a means for privacy-friendly entity authentication. &lt;br /&gt;
|-&lt;br /&gt;
|   CD4 objectives (O), success criteria (SC), and measurable outcomes (MO) || O3 / SC3.1: Reduction of cybersecurity risks of drone-to-x communications, MO3.3: Mechanisms for secure communications&lt;br /&gt;
|-&lt;br /&gt;
|   Improvement || State-of-the-art cryptographic protocols do not provide low latency as well as strong security properties such as full forward secrecy at the same time. Currently, available protocols are no means to support privacy-friendly authentication. Moreover, they lack security in the face of powerful quantum computers. All these aspects are considered within this component, improving significantly over the state-of-the-art. &lt;br /&gt;
|-&lt;br /&gt;
| Task || T5.3 &lt;br /&gt;
|-&lt;br /&gt;
| Use Case || UC5 — Agriculture  &lt;br /&gt;
|-&lt;br /&gt;
| Demonstrator || D2 — Wine production &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Architecture context and interfaces =&lt;br /&gt;
&lt;br /&gt;
The AIT component does not represent a stand-alone module but can be viewed as being located within the “VehicleCom” and “GroundCom” modules, i.e., the modules in charge of the communication between vehicles or between vehicles and the ground station and adds security features to the communication (confidentiality, authenticity, privacy). &lt;br /&gt;
&lt;br /&gt;
[[File:wp5-16-ait.png|frame|Architecture context of the component WP5-16-AIT]]&lt;br /&gt;
&lt;br /&gt;
The component can be viewed as a collection of libraries implementing protocols (e.g., secure channel establishment with strong security or privacy-friendly entity authentication) and typically replaces or augments other existing cryptographic primitives (e.g., basic mechanisms in the transport layer security (TLS) protocol). It runs on the Vehicle (VehicleCom), where it is intended to be used together with the “Secure Element” (SE) module to provide stronger security features (i.e., realize secret key operations within the SE). It also runs on the GroundStation and in combination it is possible for the Vehicle and the GroundStation to establish a secure communication (confidential and authenticated).  &lt;br /&gt;
&lt;br /&gt;
The core features our component was focusing on can be summarized as follows: &lt;br /&gt;
&lt;br /&gt;
(Low-latency) Key-exchange protocols: Our key-exchange protocols to achieve low latency (zero round-trip time, 0-RTT) together with strong security properties are built upon so called puncturable encryption schemes (or key encapsulation mechanisms).  &lt;br /&gt;
&lt;br /&gt;
Privacy-preserving authentication: Depending on the required degree of privacy (only with respect to eavesdroppers or even communication partners like the base station), we focused on protocols either obtained from anonymous (authenticated) key-exchange protocols or primitives underlying anonymous attribute-based credentials or group signature schemes.&lt;br /&gt;
&lt;br /&gt;
=     Internals and technologies  = &lt;br /&gt;
For the implementation of our component, we require a few external libraries:  &lt;br /&gt;
&lt;br /&gt;
A pairing implementation, for which we rely on the popular and highly optimized open-source pairing library RELIC6. This choice is done for multiple reasons: (1) it includes implementation of currently recommended pairing-friendly curves such as BLS12-381, (2) includes optimizations for desktop and server CPUs as well as embedded CPUs such as ARM and AVR processors, and (3) allows to configure memory handling suitable for the target platform.  &lt;br /&gt;
&lt;br /&gt;
The pyrelic library7 which provides Python bindings for the popular and highly optimized open-source pairing library RELIC. &lt;br /&gt;
&lt;br /&gt;
OpenSSL8, as one of the most used libraries for TLS which also provides TLS 1.3 support.&lt;br /&gt;
&lt;br /&gt;
Our library that implements the secure channel establishment has finally been integrated into OpenSSL and our library for privacy-preserving authentication has been integrated into the pyrelic library. More details can be found in Deliverables D5.5 and D5.6.  &lt;br /&gt;
&lt;br /&gt;
As our evaluation platform we use a Raspberry Pi 3 Model B powered by a quad-core ARM Cortex-A53 1200 MHz processor and has 1 GB SDRAM.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:Wp5-16-ait.png&amp;diff=375</id>
		<title>File:Wp5-16-ait.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:Wp5-16-ait.png&amp;diff=375"/>
		<updated>2022-07-19T09:30:46Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=374</id>
		<title>WP5-16-AIT</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=374"/>
		<updated>2022-07-19T09:27:43Z</updated>

		<summary type="html">&lt;p&gt;Ait: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Cryptographic algorithms adapted for drones=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  Identifier || WP5-16-AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   License || Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Expected TRL|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requirements will at the same time provide strong security guarantees (like full forward secrecy). Another important focus will be to provide long-term security and in particular resilience to quantum computers, i.e., post-quantum security, and privacy protection of the entities involved in a communication. &lt;br /&gt;
|-&lt;br /&gt;
|   Key Enabling Technology || KET: Security — CATEGORY: U-Space Capabilities, KET: Network Centric Communications Systems — CATEGORY: System Functions &lt;br /&gt;
|-&lt;br /&gt;
|   U-Space Capabilities || “U1: Communication, navigation and surveillance” and “U3: U-space Advanced Services”. This component can be integrated and used by drone manufacturers for general remote communication, as well as V2I and V2V communications, since in the communication-layer the component is located below the standardized and commonly used “TLS” communication layer.&lt;br /&gt;
|-&lt;br /&gt;
|   System Functions || “Communication / Network Centric Communications”: The SW-component provides functionality for secure channel establishment to protect the confidentiality and integrity of messages between two communicating entities by means of a key exchange mechanism with strong security and privacy features. Moreover, with respect to entity authentication it enables unilateral or mutual authentication of communication partners within the secure channel establishment and additionally provides a means for privacy-friendly entity authentication. &lt;br /&gt;
|-&lt;br /&gt;
|   CD4 objectives (O), success criteria (SC), and measurable outcomes (MO) || O3 / SC3.1: Reduction of cybersecurity risks of drone-to-x communications, MO3.3: Mechanisms for secure communications&lt;br /&gt;
|-&lt;br /&gt;
|   Improvement || State-of-the-art cryptographic protocols do not provide low latency as well as strong security properties such as full forward secrecy at the same time. Currently, available protocols are no means to support privacy-friendly authentication. Moreover, they lack security in the face of powerful quantum computers. All these aspects are considered within this component, improving significantly over the state-of-the-art. &lt;br /&gt;
|-&lt;br /&gt;
| Task || T5.3 &lt;br /&gt;
|-&lt;br /&gt;
| Use Case || UC5 — Agriculture  &lt;br /&gt;
|-&lt;br /&gt;
| Demonstrator || D2 — Wine production &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Architecture context and interfaces =&lt;br /&gt;
&lt;br /&gt;
The AIT component does not represent a stand-alone module but can be viewed as being located within the “VehicleCom” and “GroundCom” modules, i.e., the modules in charge of the communication between vehicles or between vehicles and the ground station and adds security features to the communication (confidentiality, authenticity, privacy). &lt;br /&gt;
&lt;br /&gt;
The component can be viewed as a collection of libraries implementing protocols (e.g., secure channel establishment with strong security or privacy-friendly entity authentication) and typically replaces or augments other existing cryptographic primitives (e.g., basic mechanisms in the transport layer security (TLS) protocol). It runs on the Vehicle (VehicleCom), where it is intended to be used together with the “Secure Element” (SE) module to provide stronger security features (i.e., realize secret key operations within the SE). It also runs on the GroundStation and in combination it is possible for the Vehicle and the GroundStation to establish a secure communication (confidential and authenticated).  &lt;br /&gt;
&lt;br /&gt;
The core features our component was focusing on can be summarized as follows: &lt;br /&gt;
&lt;br /&gt;
(Low-latency) Key-exchange protocols: Our key-exchange protocols to achieve low latency (zero round-trip time, 0-RTT) together with strong security properties are built upon so called puncturable encryption schemes (or key encapsulation mechanisms).  &lt;br /&gt;
&lt;br /&gt;
Privacy-preserving authentication: Depending on the required degree of privacy (only with respect to eavesdroppers or even communication partners like the base station), we focused on protocols either obtained from anonymous (authenticated) key-exchange protocols or primitives underlying anonymous attribute-based credentials or group signature schemes.&lt;br /&gt;
&lt;br /&gt;
=     Internals and technologies  = &lt;br /&gt;
For the implementation of our component, we require a few external libraries:  &lt;br /&gt;
&lt;br /&gt;
A pairing implementation, for which we rely on the popular and highly optimized open-source pairing library RELIC6. This choice is done for multiple reasons: (1) it includes implementation of currently recommended pairing-friendly curves such as BLS12-381, (2) includes optimizations for desktop and server CPUs as well as embedded CPUs such as ARM and AVR processors, and (3) allows to configure memory handling suitable for the target platform.  &lt;br /&gt;
&lt;br /&gt;
The pyrelic library7 which provides Python bindings for the popular and highly optimized open-source pairing library RELIC. &lt;br /&gt;
&lt;br /&gt;
OpenSSL8, as one of the most used libraries for TLS which also provides TLS 1.3 support.&lt;br /&gt;
&lt;br /&gt;
Our library that implements the secure channel establishment has finally been integrated into OpenSSL and our library for privacy-preserving authentication has been integrated into the pyrelic library. More details can be found in Deliverables D5.5 and D5.6.  &lt;br /&gt;
&lt;br /&gt;
As our evaluation platform we use a Raspberry Pi 3 Model B powered by a quad-core ARM Cortex-A53 1200 MHz processor and has 1 GB SDRAM.&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=373</id>
		<title>WP5-16-AIT</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-16-AIT&amp;diff=373"/>
		<updated>2022-07-19T09:22:23Z</updated>

		<summary type="html">&lt;p&gt;Ait: Created page with &amp;quot;=Cryptographic algorithms adapted for drones= {|class=&amp;quot;wikitable&amp;quot; |  Identifier || WP5-16-AIT |- |   Contributor	|| AIT |- |   License || Functional |- |   Expected TRL|| 4 |- |   Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requir...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Cryptographic algorithms adapted for drones=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  Identifier || WP5-16-AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   License || Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Expected TRL|| 4&lt;br /&gt;
|-&lt;br /&gt;
|   Description || This component represents a collection of cryptographic primitives and protocols whose characteristics are tailored to the use within drone environments (resource consumption, latency). In particular, the cryptographic protocols while providing means to satisfy low latency requirements will at the same time provide strong security guarantees (like full forward secrecy). Another important focus will be to provide long-term security and in particular resilience to quantum computers, i.e., post-quantum security, and privacy protection of the entities involved in a communication. &lt;br /&gt;
|-&lt;br /&gt;
|   Key Enabling Technology || KET: Security — CATEGORY: U-Space Capabilities, KET: Network Centric Communications Systems — CATEGORY: System Functions &lt;br /&gt;
|-&lt;br /&gt;
|   U-Space Capabilities || “U1: Communication, navigation and surveillance” and “U3: U-space Advanced Services”. This component can be integrated and used by drone manufacturers for general remote communication, as well as V2I and V2V communications, since in the communication-layer the component is located below the standardized and commonly used “TLS” communication layer.&lt;br /&gt;
|-&lt;br /&gt;
|   System Functions || “Communication / Network Centric Communications”: The SW-component provides functionality for secure channel establishment to protect the confidentiality and integrity of messages between two communicating entities by means of a key exchange mechanism with strong security and privacy features. Moreover, with respect to entity authentication it enables unilateral or mutual authentication of communication partners within the secure channel establishment and additionally provides a means for privacy-friendly entity authentication. &lt;br /&gt;
|-&lt;br /&gt;
|   CD4 objectives (O), success criteria (SC), and measurable outcomes (MO) || O3 / SC3.1: Reduction of cybersecurity risks of drone-to-x communications, MO3.3: Mechanisms for secure communications&lt;br /&gt;
|-&lt;br /&gt;
|   Improvement || State-of-the-art cryptographic protocols do not provide low latency as well as strong security properties such as full forward secrecy at the same time. Currently, available protocols are no means to support privacy-friendly authentication. Moreover, they lack security in the face of powerful quantum computers. All these aspects are considered within this component, improving significantly over the state-of-the-art. &lt;br /&gt;
|-&lt;br /&gt;
| Task || T5.3 &lt;br /&gt;
|-&lt;br /&gt;
| Use Case || UC5 — Agriculture  &lt;br /&gt;
|-&lt;br /&gt;
| Demonstrator || D2 — Wine production &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=372</id>
		<title>Component repository</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=372"/>
		<updated>2022-07-19T09:04:34Z</updated>

		<summary type="html">&lt;p&gt;Ait: /* Components list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This repository aims at providing common components usable in different application domains, in particular those covered by project use-cases.&lt;br /&gt;
&lt;br /&gt;
The requirements for using a components will be listed, as well as a documentation on how to use it. The component itself will be hosted by the partner who provides it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Components list==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|ID &lt;br /&gt;
|Contributor &lt;br /&gt;
|Title&lt;br /&gt;
|-&lt;br /&gt;
|[[WP3-01]]&lt;br /&gt;
|IKERLAN&lt;br /&gt;
|Safety function - Pre-Certified SOM&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-02]] &lt;br /&gt;
|EDI &lt;br /&gt;
|Modular SoC-based embedded reference architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-03]]&lt;br /&gt;
|BUT	&lt;br /&gt;
|Sensor information algorithms&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-04]]	&lt;br /&gt;
|HIB	&lt;br /&gt;
|Computer Vision Components for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-10]]	&lt;br /&gt;
|IFAT	&lt;br /&gt;
|Component for trusted communication&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-13]]	&lt;br /&gt;
|ENAC	&lt;br /&gt;
|Paparazzi UAV&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_1]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Collision avoidance and geo-fencing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_2]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Distributed control of multi-drone system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_1]]	&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|UWB based indoor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_2]]&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|Multi-antenna GNSS/INS based navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-16]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Chains Fleet Architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_1]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral payload&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_2]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral image processing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-20]]	&lt;br /&gt;
|MODIS	&lt;br /&gt;
|Multi-sensor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-22]]	&lt;br /&gt;
|UNIMORE	&lt;br /&gt;
|Onboard Compute Platform Desing Methodology&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-24]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Efficient digital implementation of controllers&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-26]]	&lt;br /&gt;
|UWB	&lt;br /&gt;
|Droneport: an autonomous drone battery management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-28]]	&lt;br /&gt;
|UNISS	&lt;br /&gt;
|Accelerator Design Methodology for OOCP&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_1]]	&lt;br /&gt;
|UDANET	&lt;br /&gt;
|Smart and predictive energy management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_2]]&lt;br /&gt;
|UDANET	&lt;br /&gt;
|AI drone system modules&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-37]]	&lt;br /&gt;
|Aitek	&lt;br /&gt;
|Video and data analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-2]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Land Precision landing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-5]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI detection for clearance&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-16]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Enhanced Navigation Software&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-10]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Cooperative Planner&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-14]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Map Enhancement Service&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-15]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Visual Analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-17]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Anchor&amp;amp;Tag firmware of the Indoor  Positioning System &lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-18_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|Drone-Rover Transponder&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-20]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Attractor-based Navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-22]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Shared Reference Frame&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-32]]	&lt;br /&gt;
|SHERPA&lt;br /&gt;
|Dynamic control development for navigation and precision landing&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-33]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Autonomy, cooperation, and awareness&lt;br /&gt;
|-  &lt;br /&gt;
|[[WP4-39]]	&lt;br /&gt;
|HIB&lt;br /&gt;
|Simulated data aggregator supporting intelligent decision in computer vision components&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-42]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI Stabilization&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-03]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Com Safe fleet communication&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-05_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|LP-WAN for UAV identification and monitoring&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-11_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Navigation system with anti-jamming and anti-spoofing features&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-16-AIT]]	&lt;br /&gt;
|AIT&lt;br /&gt;
|Cryptographic algorithms adapted for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-19_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Robust communication for an improved Indoor Positioning System&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-P4R]]	&lt;br /&gt;
|CEA	&lt;br /&gt;
|Model driven engineering&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-ESDE]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|ESL embedded SW Design Environment (ESDE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-IPS-MAF]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Indoor Positioning System Modelling&amp;amp;Analysis Framework (IPS-MAF)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-17]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HW/SW CO-DEsign of HEterogeneous Parallel dedicated Systems (HEPSYCODE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-34]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HEPSYCODE SystemC SIMulator Version 2.0 (HEPSIM2)&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
</feed>