Thu 4 Sep 2025 16:00 - 16:30 at Room 1.1 - Privacy and Security Chair(s): Tobias Hey

Modern software systems increasingly rely on personal data. Despite the enforcement of the European General Data Protection Regulation (GDPR) and the growing awareness about privacy and data protection, many individuals’ rights remain unsatisfactorily implemented in software systems. This is partially due to the knowledge gap between legal interpretation and software development. In this paper, we address this gap first by extracting, in close collaboration with legal experts, a list of 108 requirements pertinent to the right of access (ACC) and the right to portability (PRT), two fundamental rights under the GDPR. We further propose the XTRAREG approach, which utilizes large language models (LLMs) and retrieval augmented generation (RAG) to provide automated assistance in extracting privacy requirements from predefined legal sources. Compared to the manually extracted requirements, XTRAREG can automatically generate requirements with an accuracy of 81.8% for ACC and 56.7% for PRT. Our empirical evaluation reveals two notable observations: (i) A skewed performance in the favor of ACC, indicating the significant impact of abundant training data of the LLM, (ii) despite explicit exposure of legal references through RAG, the LLM generates requirements predominantly from the GDPR.

Thu 4 Sep

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

16:00 - 17:30
Privacy and SecurityRE@Next! Papers / Research Papers at Room 1.1
Chair(s): Tobias Hey Karlsruhe Institute of Technology (KIT)
16:00
30m
Paper
LLM-assisted Extraction of Regulatory Requirements: A Case Study on the GDPR
Research Papers
Sallam Abualhaija University of Luxembourg, Marcello Ceci University of Luxembourg, Nicolas Sannier University of Luxembourg, SnT, Domenico Bianculli University of Luxembourg, Salomé Lannier , Martina Siclari University of Luxembourg, Olivier Voordeckers University of Luxembourg, Stanisław Tosza University of Luxembourg
16:30
20m
Paper
Generating Privacy Stories From Software Documentation
RE@Next! Papers
16:50
20m
Paper
Recommending Security Requirements through Asset Identification and Threat Mapping
RE@Next! Papers
Sugandha Malviya Ball State University, André Fonteles Ball State University, Angeles Marin Batana Ball State University, Alec Burch-DeWitt Ball State University
17:10
20m
Paper
Satisfying Complex Data Security Requirements in Digital Business Ecosystems
RE@Next! Papers
Yulu Wang Vrije Universiteit Amsterdam, Charlotte van der Velden , Sabine Oechsner Vrije Universiteit Amsterdam, Jaap Gordijn Vrije Universiteit Amsterdam