L. Zhou and S. Chen, A Survey of Research on Smart Grid Security, Network Computing and Information Security, ser. Communications in Computer and Information Science, pp.395-405
DOI : 10.1007/978-3-642-35211-9_52

. The-modbus-organization and . Inc, The Modbus Protocol Specification V1.1b3

Y. Zhang, L. Wang, W. Sun, R. C. Green, and M. Alam, Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.796-808, 2011.
DOI : 10.1109/TSG.2011.2159818

A. Hamadi, M. N. Hussam, C. Yeun, and M. Zemerly, A Novel Security Scheme for the Smart Grid and SCADA Networks, Wireless Personal Communications, pp.1-13, 2013.

W. Wang and Z. Lu, Cyber security in the Smart Grid: Survey and challenges, Computer Networks, vol.57, issue.5, pp.1344-1371, 2013.
DOI : 10.1016/j.comnet.2012.12.017

J. Gao, Y. Xiao, J. Liu, W. Liang, and C. L. Chen, A survey of communication/networking in Smart Grids, Future Generation Computer Systems, vol.28, issue.2, 2012.
DOI : 10.1016/j.future.2011.04.014

M. Object and . Group, The UML standard specification

B. Bannour, C. Gaston, A. Lapitre, and J. Escobedo, Incremental Symbolic Conformance Testing from UML MARTE Sequence Diagrams: Railway Use Case, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, 2012.
DOI : 10.1109/HASE.2012.18

J. Schmaltz and J. Tretmans, On Conformance Testing for Timed Systems, Proc. of Int. Conf. Formal Modeling and Analysis of Timed Systems (FORMATS), 2008.
DOI : 10.1007/978-3-540-85778-5_18

H. Bohnenkamp and A. Belinfante, Timed Testing with TorX, Proc. of Int. Conf. Formal Methods Europe (FM, 2005.
DOI : 10.1007/11526841_13

M. Krichen and S. Tripakis, Black-box time systems, Proc. of Int. SPIN Workshop Model Checking of Software, 2004.

C. Gaston, P. L. Gall, N. Rapin, and A. Touil, Symbolic Execution Techniques for Test Purpose Definition, Proc. of Int. Conf. Testing of Software and Communicating Systems, pp.1-18, 2006.
DOI : 10.1007/11754008_1

URL : https://hal.archives-ouvertes.fr/hal-00342082

R. Alur and D. L. Dill, The Theory of Timed Automata, Proc. of REX Workshop the Real-Time: Theory in Practice, 1992.

D. Dolev and A. C. Yao, On the security of public key protocols Information Theory, IEEE Transactions on, vol.29, issue.2, 1983.

B. Bannour, J. Escobedo, C. Gaston, L. Gall, P. Pedroza et al., Security Weaknesses Detection by Symbolic Analysis of Scenarios, 2014 21st Asia-Pacific Software Engineering Conference, pp.367-374, 2014.
DOI : 10.1109/APSEC.2014.61

P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, Attack taxonomies for the Modbus protocols, International Journal of Critical Infrastructure Protection, vol.1, 2008.
DOI : 10.1016/j.ijcip.2008.08.003

S. Rugaber and K. Stirewalt, Model-driven reverse engineering, IEEE Software, vol.21, issue.4, pp.45-53, 2004.
DOI : 10.1109/MS.2004.23

A. Jain, S. Soner, and A. Gadwal, Reverse engineering: Journey from code to design, 2011 3rd International Conference on Electronics Computer Technology, pp.102-106, 2011.
DOI : 10.1109/ICECTECH.2011.5941966

C. Torens, L. Ebrecht, and K. Lemmer, Starting Model-Based Testing Based on Existing Test Cases Used for Model Creation, 2011 IEEE 11th International Conference on Computer and Information Technology, pp.320-327, 2011.
DOI : 10.1109/CIT.2011.99

A. Hudic, L. Zechner, S. Islam, C. Krieg, E. R. Weippl et al., Towards a Unified Penetration Testing Taxonomy, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.811-812, 2012.
DOI : 10.1109/SocialCom-PASSAT.2012.65