<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Summary of WESPr-18: The International Workshop on Evidence-based Security and Privacy in the Wild</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hironori Washizaki</string-name>
          <email>washizaki@waseda.jp</email>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nobukazu Yoshioka</string-name>
          <email>nobukazu@nii.ac.jp</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eduardo B. Fernandez</string-name>
          <email>fernande@fau.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomoko Kaneko</string-name>
          <email>t-kaneko@ipa.go.jp</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Shuichiro Yamamoto</string-name>
          <email>yamamotosui@icts.nagoya-</email>
          <email>yamamotosui@icts.nagoyau.ac.jp</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>“An Assurance Case Approach for Software Code</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Florida Atlantic University</institution>
          ,
          <addr-line>Boca Raton</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Information-technology, Promotion Agency</institution>
          ,
          <addr-line>Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Nagoya University</institution>
          ,
          <addr-line>Nagoya</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National Institute of Informatics</institution>
          ,
          <addr-line>Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Security” by Ryota Miyabayashi</institution>
          ,
          <addr-line>Noritoshi Atsumi, Shuji Morisaki and Shuichiro Yamamoto</addr-line>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Waseda Univeristy / National, Institute of Informatics / SYSTEM, INFORMATION / eXmotion</institution>
          ,
          <addr-line>Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <abstract>
        <p>-This paper summarizes the objectives and results of the WESPr-18: The International Workshop on Evidencebased Security and Privacy in the Wild held on December 4th in Nara, Japan. The workshop was collocated with APSEC 2018.</p>
      </abstract>
      <kwd-group>
        <kwd>security and privacy</kwd>
        <kwd>IoT systems</kwd>
        <kwd>cloud computing</kwd>
        <kwd>AI and machine learning systems</kwd>
        <kwd>patterns</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Smart and ubiquitous software systems manages everything
in our lives. In such complex software-intensive systems,
software engineering is required to face wild challenges rather
than tame problems especially in terms of security and privacy
in a dependable way since there are many difficulties on these
aspects for complex systems in an uncertain world.</p>
      <p>
        In 2016, we addressed a part of these difficulties by holding
the 1st International Workshop for Models and Modelling on
Security and Privacy (WM2SP-16) collocated with ER 2016
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. By extending the scope to evidence-based security and
privacy in complex systems, we held the International
Workshop on Evidence-based Security and Privacy in the Wild
(WESPr-18) on December 4th in Nara, Japan collocated with
APSEC 2018 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. There were around 12 participants including
the authors of this paper as workshop organizers.
      </p>
      <p>In this paper, we summarize the objective and result of the
WESPr-18.</p>
    </sec>
    <sec id="sec-2">
      <title>II. OBJECTIVE</title>
      <p>Cloud Computing has led to a global shift in the computing
world and the paradigm itself is evolving as new functions or
technologies become available. Intelligent and interactive
environments like Internet of Things (IoT) have found
application in various domains. Billions of smart devices are
connected to the internet and are producing huge amounts of
data, increasing both complexity and uncertainty of humans,
physical objects and machine-learning modules, especially on
security and privacy, which we must manage. We need to
tackle such difficulties on security and privacy for complex
systems in an uncertain world in a dependable way, such as
models of evidence-based reasoning, argumentation,
traceability or/and big data. Security evidences make a system
trusted and dependable in a big data era.</p>
      <p>This workshop aimed to bring together researchers and
practitioners in the areas of evidence-based modelling, security
patterns, reasoning, argumentation, traceability, forensics in big
data for secure and privacy-aware software development for
complex and uncertain systems, to exchange ideas and
preliminary results. Especially, we wanted to discuss how to
utilize security evidence in security engineering.</p>
      <p>The objective of the workshop reveals (1) important
problems to be tackled for Security and Privacy on Complex
and Uncertain Systems and (2) research challenges through
presentations and discussion. The topics included security and
privacy models, pattern-based security and privacy modelling,
knowledge base for security, reasoning, argumentation,
traceability, and forensics in big data and/or privacy-aware
software development, security and privacy modelling and
reasoning tools, and experiences for secure and/or
privacyaware software development.</p>
    </sec>
    <sec id="sec-3">
      <title>III. PROGRAM</title>
      <sec id="sec-3-1">
        <title>A. Technical Papers</title>
        <p>There were six paper submissions by the due date. The
program committee conducted a rigorous peer review by
assigning at least two reviewers to each submission. The
workshop organizers finally selected the following four papers
for presentation and inclusion into the proceedings.

“Using a variety of patterns in a secure software
development methodology” by Eduardo B. Fernandez
and Nobukazu Yoshioka

•
•
•
“Restructuring Attack Trees to Identify Incorrect or
Missing Relationships between Nodes” by Cai Hua,
Hironori Washizaki, Yoshiaki Fukazawa, Takao
Okubo, Kaiya Haruhiko and Yoshioka Nobukazu,
“Threat analysis using STRIDE with STAMP/STPA”
by Tomoko Kaneko, Yuji Takahashi, Takao Okubo
and Ryoichii Sasaki</p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Invited talk and minitutorial</title>
        <p>In addition to the technical paper presentations, the
workshop had the following two invited talks and one
minitutorial.</p>
        <p>Invited talk: “Safety and Security Co-engineering – A
new emerging discipline for safe and secure system
development” by Kenji Taguchi
Invited talk: “Developing Secure and
PrivacyPreserving Applications” by Emiliano Tramontana
Mini-tutorial: “Evaluating the degree of security of a
system built using security patterns” by Eduardo B.
Fernandez</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. CONCLUSIONS AND FUTURE PROSPECTIVE</title>
      <p>The workshop was successful to start research and
discussion on security and privacy in complex systems
including IoT and AI-based systems. Figure 1 shows the group
photo taken when closing the workshop (it does not include all
the participants).</p>
      <p>The workshop organizers and participants had open
discussions to dig deeper into the topics addressed by the paper
presentations and talks.</p>
      <p>
        During the discussion, we confirmed the necessity of
clarification of difficulties and research directions for security
and privacy in complex systems such as IoT, AI and
Blockchain-based systems. For example, we need to address
the nature of IoT ecosystem such as diversity and dynamic
heterogeneous configuration of devices. In relation to that, we
also need to address the nature of attacks for Cyber-Physical
Systems (CPSs) such as physical attacks and information ones.
Although some papers in the workshop employed STRIDE [
        <xref ref-type="bibr" rid="ref3 ref4">3,
4</xref>
        ] as a threat model for clarifying threats in complex systems,
we discussed a possibility of extension of STRIDE for IoT and
CPS.
      </p>
      <p>
        In addition to threat models, we also discussed the
necessity of having and classifying security and misuse
patterns for IoT and CPS. For such purpose, reference
architectures and frameworks for IoT such as [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] may be
needed as foundations.
      </p>
      <p>We discussed that it is also important to consider people,
organizational and operational aspects such as the operation
phase and the concept of operation for IoT and CPS in terms of
security and privacy concerns.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Takao</given-names>
            <surname>Okubo</surname>
          </string-name>
          ,
          <source>Atsuo Hazeyama and Eduardo B. Fernandez, “Models and Modelling on Security and Privacy - The 1st International Workshop for Models and Modelling on Security and Privacy (WM2SP16)</source>
          ,” in “Advances in Conceptual Modeling - ER 2016 Workshops,” edited bySebastian Link and
          <string-name>
            <surname>Juan C. Trujillo</surname>
            ,
            <given-names>LNCS</given-names>
          </string-name>
          , Vol.
          <volume>9975</volume>
          , p.
          <fpage>229</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Katsuhisa</given-names>
            <surname>Maruyama</surname>
          </string-name>
          , Naoyasu Ubayashi, Hironori Washizaki and Hongyu Zhang,
          <source>“Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC</source>
          <year>2018</year>
          ),” IEEE Computer Society,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>The STRIDE Threat Model"</source>
          ,
          <year>2002</year>
          , https://msdn.microsoft.com/enus/library/ee823878(v=cs.20).aspx
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Bruce</given-names>
            <surname>Potter</surname>
          </string-name>
          , “
          <string-name>
            <surname>Microsoft SDL Threat Modelling</surname>
            <given-names>Tool</given-names>
          </string-name>
          ,” Network Security, Vol.
          <year>2009</year>
          , No.
          <issue>1</issue>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          , “
          <source>Microsoft Azure IoT Reference Architecture Version</source>
          <volume>2</volume>
          .1,”
          <year>2018</year>
          , https://aka.ms/iotrefarchitecture
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Mohab</given-names>
            <surname>Aly</surname>
          </string-name>
          , Foutse Khomh,
          <string-name>
            <surname>Yann-Gaël</surname>
            <given-names>Guéhéneuc</given-names>
          </string-name>
          , Hironori Washizaki, and Soumaya Yacout, “
          <article-title>Is Fragmentation a Threat to the Success of the Internet of Things?</article-title>
          ,
          <source>” IEEE Internet of Things Journal, Early Access</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>AsianPLoP</surname>
          </string-name>
          <year>2019</year>
          :
          <article-title>8th Asian Conference on Pattern Languages of Programs</article-title>
          , http://asianplop.org
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>IEEE</given-names>
            <surname>International</surname>
          </string-name>
          <article-title>Symposium on Smart IoT Systems and Applications (SISA</article-title>
          <year>2019</year>
          ), https://ieeecompsac.computer.org/2019/iot/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Asia-Pacific Software</surname>
          </string-name>
          Engineering Conference, http://www.apsecconferences.org/
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>