Thu 7 Sep 2023 13:45 - 15:15 at f128 - Poster and Tool Demos

Advanced Persistent Threat (APT) attacks are complex, employing diverse attack elements and increasingly intelligent techniques. This paper introduces a tool for security risk assessment specifically designed for these attacks. This tool assists security teams in systematically analyzing APT attacks to derive adaptive security requirements for mission-critical target systems. Additionally, the tool facilitates the assessment of security risks, providing a comprehensive understanding of their impact on target systems. By leveraging this tool, security teams can enhance defense strategies, mitigating potential threats and ensuring the security of target systems.

Thu 7 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

13:45 - 15:15
Poster and Tool DemosPosters and Tool Demos at f128
13:45
90m
Poster
Towards Locating Requirements within Agile Development Artifacts (Student Poster)
Posters and Tool Demos
A: Ashley van Can Department of Information and Computing Sciences, Utrecht University
13:45
90m
Demonstration
AutoReco: A Tool for Recommending Requirements for their Non-Conformance with Requirement Templates (RTs)
Posters and Tool Demos
A: Shivani Balwani DA-IICT Gandhinagar, A: Saurabh Tiwari DA-IICT Gandhinagar, A: Sourish Dasgupta DA-IICT Gandhinagar, A: Akhilesh Sharma SAC ISRO, Govt of India
13:45
90m
Demonstration
NL2PD: A Tool for Problem Diagram Generation from Requirements in Natural Language
Posters and Tool Demos
A: Xuan Chen School of Computer Science and Engineering, Guangxi Normal University, A: Yajun Deng School of Computer Science and Engineering, Guangxi Normal University, A: Hongbin Xiao , A: Zhi Li Guangxi Normal University
13:45
90m
Poster
PersonaGen: A Tool for Generating Personas from User Feedback
Posters and Tool Demos
A: Xishuo Zhang College of Computer Science and Technology, Inner Mongolia Normal University, Lin Liu College of Computer Science and Technology, Inner Mongolia Normal University, A: Yi Wang School of Information Technology, Deakin University, A: Xiao Liu School of Information Technology, Deakin University, A: Hailong Wang College of Computer Science and Technology, Inner Mongolia Normal University, A: Anqi Ren College of Computer Science and Technology, Inner Mongolia Normal University, A: Chetan Arora Monash University
13:45
90m
Demonstration
A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence
Posters and Tool Demos
A: Sihn-Hye Park Ajou University, A: Dongyoon Kim Ajou University, A: Seok-Won Lee Ajou University
Pre-print
13:45
90m
Poster
NFRNet-LT: Improving Accuracy in Extracting Long-tailed Non-functional Requirements
Posters and Tool Demos
A: Jiaqing Deng , A: Zhi Li Guangxi Normal University, A: Xiayu Zhou School of Computer Science and Engineering, Guangxi Normal University, A: Hongbin Xiao
13:45
90m
Demonstration
ModeLLer – a Prototype to Support Requirements Elicitation in Co-design Environments
Posters and Tool Demos
A: Chiara Mannari , A: Alessio Ferrari CNR-ISTI, A: Manlio Bacco , A: Tommaso Turchi University of Pisa, A: Alessio Malizia Molde University College, A: Elisa Anichini University of Pisa
13:45
90m
Demonstration
PF4MD: A Microservice Decomposition Tool Combining Problem Frames
Posters and Tool Demos
A: Yulong Li , A: Zhi Li Guangxi Normal University, A: Yitao Bu School of Computer Science and Engineering, Guangxi Normal University, A: Hongbin Xiao , A: Yajun Deng School of Computer Science and Engineering, Guangxi Normal University