Thu 4 Sep 2025 16:50 - 17:10 at Room 1.1 - Privacy and Security Chair(s): Tobias Hey

As digital system grow more complex and threats continue to evolve, adopting an Artificial Intelligence(AI)-driven approach is essential to improve the efficiency and accuracy of identifying security threats. This is especially important in regulated industries like healthcare, finance, and automotive, where protecting sensitive data and complying with regulations is crucial. Our research aims to recommend security requirements by proposing an adaptive framework that uses AI tools for asset identification, threat mapping, and requirements generation. We explore how key system assets, such as databases, authentication modules, and API gateways, can be mapped to both current and emerging threats to generate security requirements. Our approach utilizes advanced AI methods, including Large Language Models(LLMs) and Natural Language Processing(NLP) to identify critical assets from software artifacts and retrieve relevant threats for each asset. We present an initial end-to-end workflow model and demonstrate its feasibility using a sample case study. The approach’s effectiveness depends on the quality of input data and the clarity of its outputs, which can be challenging to achieve in complex environments. Nevertheless, we expect it to provide a solid foundation for enhancing the security requirements process.

Thu 4 Sep

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

16:00 - 17:30
Privacy and SecurityRE@Next! Papers / Research Papers at Room 1.1
Chair(s): Tobias Hey Karlsruhe Institute of Technology (KIT)
16:00
30m
Paper
LLM-assisted Extraction of Regulatory Requirements: A Case Study on the GDPR
Research Papers
Sallam Abualhaija University of Luxembourg, Marcello Ceci University of Luxembourg, Nicolas Sannier University of Luxembourg, SnT, Domenico Bianculli University of Luxembourg, Salomé Lannier , Martina Siclari University of Luxembourg, Olivier Voordeckers University of Luxembourg, Stanisław Tosza University of Luxembourg
16:30
20m
Paper
Generating Privacy Stories From Software Documentation
RE@Next! Papers
16:50
20m
Paper
Recommending Security Requirements through Asset Identification and Threat Mapping
RE@Next! Papers
Sugandha Malviya Ball State University, André Fonteles Ball State University, Angeles Marin Batana Ball State University, Alec Burch-DeWitt Ball State University
17:10
20m
Paper
Satisfying Complex Data Security Requirements in Digital Business Ecosystems
RE@Next! Papers
Yulu Wang Vrije Universiteit Amsterdam, Charlotte van der Velden , Sabine Oechsner Vrije Universiteit Amsterdam, Jaap Gordijn Vrije Universiteit Amsterdam