<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Summary of WESPr-18: The International Workshop on Evidence-based Security and Privacy in the Wild</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Hironori</forename><surname>Washizaki</surname></persName>
							<email>washizaki@waseda.jp</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Waseda Univeristy</orgName>
								<orgName type="institution" key="instit2">National Institute of Informatics / SYSTEM INFORMATION / eXmotion</orgName>
								<address>
									<settlement>Tokyo</settlement>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nobukazu</forename><surname>Yoshioka</surname></persName>
							<email>nobukazu@nii.ac.jp</email>
							<affiliation key="aff1">
								<orgName type="institution">National Institute of Informatics Tokyo</orgName>
								<address>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eduardo</forename><forename type="middle">B</forename><surname>Fernandez</surname></persName>
							<email>fernande@fau.edu</email>
							<affiliation key="aff2">
								<orgName type="institution">Florida Atlantic University</orgName>
								<address>
									<settlement>Boca Raton</settlement>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tomoko</forename><surname>Kaneko</surname></persName>
							<email>t-kaneko@ipa.go.jp</email>
							<affiliation key="aff3">
								<orgName type="institution">Information-technology Promotion Agency Tokyo</orgName>
								<address>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Shuichiro</forename><surname>Yamamoto</surname></persName>
							<email>yamamotosui@icts.nagoya-u.ac.jp</email>
							<affiliation key="aff4">
								<orgName type="institution">Nagoya University Nagoya</orgName>
								<address>
									<country key="JP">Japan</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Summary of WESPr-18: The International Workshop on Evidence-based Security and Privacy in the Wild</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">9A69425D9A68AF518BEEDB133B8F11E2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T02:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>security and privacy</term>
					<term>IoT systems</term>
					<term>cloud computing</term>
					<term>AI and machine learning systems</term>
					<term>patterns</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper summarizes the objectives and results of the WESPr-18: The International Workshop on Evidencebased Security and Privacy in the Wild held on December 4th in Nara, Japan. The workshop was collocated with APSEC 2018.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>Smart and ubiquitous software systems manages everything in our lives. In such complex software-intensive systems, software engineering is required to face wild challenges rather than tame problems especially in terms of security and privacy in a dependable way since there are many difficulties on these aspects for complex systems in an uncertain world.</p><p>In 2016, we addressed a part of these difficulties by holding the 1st International Workshop for Models and Modelling on Security and Privacy (WM2SP-16) collocated with ER 2016 <ref type="bibr" target="#b0">[1]</ref>. By extending the scope to evidence-based security and privacy in complex systems, we held the International Workshop on Evidence-based Security and Privacy in the Wild (WESPr-18) on December 4th in Nara, Japan collocated with APSEC 2018 <ref type="bibr" target="#b1">[2]</ref>. There were around 12 participants including the authors of this paper as workshop organizers.</p><p>In this paper, we summarize the objective and result of the WESPr-18.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. OBJECTIVE</head><p>Cloud Computing has led to a global shift in the computing world and the paradigm itself is evolving as new functions or technologies become available. Intelligent and interactive environments like Internet of Things (IoT) have found application in various domains. Billions of smart devices are connected to the internet and are producing huge amounts of data, increasing both complexity and uncertainty of humans, physical objects and machine-learning modules, especially on security and privacy, which we must manage. We need to tackle such difficulties on security and privacy for complex systems in an uncertain world in a dependable way, such as models of evidence-based reasoning, argumentation, traceability or/and big data. Security evidences make a system trusted and dependable in a big data era. This workshop aimed to bring together researchers and practitioners in the areas of evidence-based modelling, security patterns, reasoning, argumentation, traceability, forensics in big data for secure and privacy-aware software development for complex and uncertain systems, to exchange ideas and preliminary results. Especially, we wanted to discuss how to utilize security evidence in security engineering.</p><p>The objective of the workshop reveals (1) important problems to be tackled for Security and Privacy on Complex and Uncertain Systems and (2) research challenges through presentations and discussion. The topics included security and privacy models, pattern-based security and privacy modelling, knowledge base for security, reasoning, argumentation, traceability, and forensics in big data and/or privacy-aware software development, security and privacy modelling and reasoning tools, and experiences for secure and/or privacyaware software development.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. PROGRAM A. Technical Papers</head><p>There were six paper submissions by the due date. The program committee conducted a rigorous peer review by assigning at least two reviewers to each submission. The workshop organizers finally selected the following four papers for presentation and inclusion into the proceedings.  "Threat analysis using STRIDE with STAMP/STPA" by Tomoko Kaneko, Yuji Takahashi, Takao Okubo and Ryoichii Sasaki</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Invited talk and minitutorial</head><p>In addition to the technical paper presentations, the workshop had the following two invited talks and one minitutorial.</p><p>• Invited talk: "Safety and Security Co-engineering -A new emerging discipline for safe and secure system development" by Kenji Taguchi</p><p>• Invited talk: "Developing Secure and Privacy-Preserving Applications" by Emiliano Tramontana</p><p>• Mini-tutorial: "Evaluating the degree of security of a system built using security patterns" by Eduardo B. Fernandez</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. DISCUSSSION RESULTS</head><p>The workshop organizers and participants had open discussions to dig deeper into the topics addressed by the paper presentations and talks.</p><p>During the discussion, we confirmed the necessity of clarification of difficulties and research directions for security and privacy in complex systems such as IoT, AI and Blockchain-based systems. For example, we need to address the nature of IoT ecosystem such as diversity and dynamic heterogeneous configuration of devices. In relation to that, we also need to address the nature of attacks for Cyber-Physical Systems (CPSs) such as physical attacks and information ones. Although some papers in the workshop employed STRIDE <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> as a threat model for clarifying threats in complex systems, we discussed a possibility of extension of STRIDE for IoT and CPS.</p><p>In addition to threat models, we also discussed the necessity of having and classifying security and misuse patterns for IoT and CPS. For such purpose, reference architectures and frameworks for IoT such as <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref> may be needed as foundations.</p><p>We discussed that it is also important to consider people, organizational and operational aspects such as the operation phase and the concept of operation for IoT and CPS in terms of security and privacy concerns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. CONCLUSIONS AND FUTURE PROSPECTIVE</head><p>The workshop was successful to start research and discussion on security and privacy in complex systems including IoT and AI-based systems. Figure <ref type="figure" target="#fig_1">1</ref> shows the group photo taken when closing the workshop (it does not include all the participants).</p><p>We considered further editions of the workshop. Possible venues include AsianPLoP 2019 <ref type="bibr" target="#b6">[7]</ref>, SISA 2019 <ref type="bibr" target="#b7">[8]</ref> as a part of COMPSAC 2019, and APSEC 2019 <ref type="bibr" target="#b8">[9]</ref>. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>"Using a variety of patterns in a secure software development methodology" by Eduardo B. Fernandez and Nobukazu Yoshioka  "An Assurance Case Approach for Software Code Security" by Ryota Miyabayashi, Noritoshi Atsumi, Shuji Morisaki and Shuichiro Yamamoto  "Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes" by Cai Hua, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Kaiya Haruhiko and Yoshioka Nobukazu,</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. WESPr-18 group photo</figDesc><graphic coords="2,315.00,185.15,252.50,142.35" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Models and Modelling on Security and Privacy -The 1st International Workshop for Models and Modelling on Security and Privacy (WM2SP-16)</title>
		<author>
			<persName><forename type="first">Takao</forename><surname>Okubo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Atsuo</forename><surname>Hazeyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eduardo</forename><forename type="middle">B</forename><surname>Fernandez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Conceptual Modeling -ER 2016 Workshops</title>
				<editor>
			<persName><forename type="first">Juan</forename><forename type="middle">C</forename><surname>Trujillo</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2006">9975. 2006</date>
			<biblScope unit="page">229</biblScope>
		</imprint>
	</monogr>
	<note>bySebastian Link</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">Katsuhisa</forename><surname>Maruyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Naoyasu</forename><surname>Ubayashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hironori</forename><surname>Washizaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hongyu</forename><surname>Zhang</surname></persName>
		</author>
		<title level="m">Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC 2018)</title>
				<meeting>the 25th Asia-Pacific Software Engineering Conference (APSEC 2018)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">The STRIDE Threat Model</title>
		<ptr target="https://msdn.microsoft.com/enus/library/ee823878(v=cs.20).aspx" />
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>Microsoft</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Microsoft SDL Threat Modelling Tool</title>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Potter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Network Security</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="15" to="18" />
			<date type="published" when="2009">2009. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Microsoft Azure IoT Reference Architecture Version 2.1</title>
		<ptr target="https://aka.ms/iotrefarchitecture" />
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Is Fragmentation a Threat to the Success of the Internet of Things?</title>
		<author>
			<persName><forename type="first">Mohab</forename><surname>Aly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Foutse</forename><surname>Khomh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yann-Gaël</forename><surname>Guéhéneuc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hironori</forename><surname>Washizaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Soumaya</forename><surname>Yacout</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal, Early Access</title>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="http://asianplop.org" />
		<title level="m">8th Asian Conference on Pattern Languages of Programs</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>AsianPLoP</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="https://ieeecompsac.computer.org/2019/iot/" />
		<title level="m">IEEE International Symposium on Smart IoT Systems and Applications</title>
				<meeting><address><addrLine>SISA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="http://www.apsec-conferences.org/" />
		<title level="m">Asia-Pacific Software Engineering Conference</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
