PROFES 2025
Mon 1 - Wed 3 December 2025 Salerno , Italy

Context: AI technologies are increasingly embedded in products and software engineering processes of industrial IoT, autonomous systems, and cyber-physical systems. It is therefore essential to ensure alignment with safety, reliability, and ethical standards. However, practical software engineering methods for managing misalignment risks remain underdeveloped. Objective: This study aims to explore industry awareness of misalignment risks and current practices for monitoring them within real-world software engineering contexts. Method: We conducted seven interviews with industry professionals to examine perceptions of misalignment risks, gather insights into existing practices, and understand approaches to alignment across various industrial settings. Three recently proposed taxonomies guided our discussions: one on ethical guidelines for trustworthy AI published by the EU, another summarizing identified AI risks, and a third addressing “double-edged components” (aspects of AI systems that can simultaneously yield positive and negative effects.) Results: Our analysis identified common misalignment risks across these settings and revealed limited use of dedicated testing or monitoring for AI alignment. Most organizations rely on general oversight rather than specialized tools. Conclusion: These findings highlight the need to develop tailored governance practices for alignment in industrial software engineering settings.

Wed 3 Dec

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:30 - 13:00
Software Composition, Compliance, and SecurityResearch Papers / Short Papers and Posters / Industry Papers at Sala degli Affreschi (Fresco Room)
Chair(s): Eriks Klotins Blekinge Institute of Technology
11:30
15m
Talk
AI Alignment for Ethical Compliance and Risk Mitigation in Industrial Applications
Research Papers
Rushali Gupta Lund University, Qunying Song University College London, Matthias Wagner Lund University, Emelie Engstrom Lund University, Emma Söderberg Lund University, Markus Borg CodeScene, Per Runeson Lund University
11:45
15m
Talk
FOSS-chain: using blockchain for Open Source Software license compliance
Research Papers
Kypros Iacovou University of Cyprus, Georgia Kapitsaki University of Cyprus, Evangelia Vanezi University of Cyprus
File Attached
12:00
15m
Talk
Pipelines Under Pressure: An Empirical Study of Security Misconfigurations of GitHub Workflows
Research Papers
Edoardo Riggio Software Institute - USI, Lugano, Cesare Pautasso Software Institute, Faculty of Informatics, USI Lugano
DOI
12:15
15m
Talk
Policy-driven Software Bill of Materials on GitHub: An Empirical Study
Research Papers
Oleksii Novikov Blekinge Institute of Technology, Davide Fucci Blekinge Institute of Technology, Oleksandr Adamov Blekinge Institute of Technology, Daniel Mendez Blekinge Institute of Technology and fortiss
12:30
10m
Talk
Cross-Domain Evaluation of Transformer-Based Vulnerability Detection on Open & Industry Data
Industry Papers
Moritz Mock Free University of Bozen-Bolzano, Thomas Forrer Wurth Phoenix S.r.l., Barbara Russo Free University of Bolzano
DOI Pre-print File Attached
12:40
7m
Talk
Detecting and Characterizing Low and No Functionality Packages in the NPM Ecosystem
Short Papers and Posters
Napasorn Tevarut Kasetsart University, Brittany Reid Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Pattara Leelaprute Kasetsart University, Arnon Rungsawang Kasetsart University, Bundit Manaskasemsak Kasetsart University, Hajimu Iida Nara Institute of Science and Technology
File Attached
12:47
7m
Talk
An Empirical Study of Security-Policy Related Issues in Open Source Projects
Short Papers and Posters
Rintaro Kanaji Nara Institute of Science and Technology, Brittany Reid Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Raula Gaikovina Kula The University of Osaka, Hajimu Iida Nara Institute of Science and Technology
File Attached