
framework (Khan et al., 2017) will be used to ana-
lyze potential threats during the design phase (e.g.,
business process modeling), while the Cyber Kill
Chain (Yadav and Rao, 2015) will assess the frame-
work’s effectiveness against potential attack phases
(e.g., source-code testing or logging).
REFERENCES
Abal, I., Melo, J., St
˘
anciulescu, ¸S., Brabrand, C., Ribeiro,
M., and W ˛asowski, A. (2018). Variability bugs in
highly configurable systems: A qualitative analysis.
Transactions on Software Engineering, 26(3):1–34.
Achour, I., Labed, L., and Ghezala, H. B. (2015a). Formal-
ization of secure service oriented product line. In In-
ternational Conference on Software Technologies (IC-
SOFT), pages 1–8. IEEE.
Achour, I., Labed, L., and Ghezala, H. B. (2015b). Propo-
sition of secure service oriented product line. In In-
ternational Symposium on Computers in Education
(SIIE), pages 52–59. IEEE.
Adejokun, A. and Siok, M. F. (2020). Effective systems
security requirements in product line engineering. IN-
SIGHT, 23(3):26–30.
Alam, M. M., Khan, A. I., and Zafar, A. (2017). A secure
framework for software product line development. In-
ternational Journal of Computer Applications, Foun-
dation of Computer Science, 975:33–40.
Apel, S., Batory, D., Kästner, C., and Saake, G. (2013).
Feature-oriented software product lines. Springer.
Batory, D. (2004). Feature-Oriented Programming and the
AHEAD Tool Suite. In International Conference on
Software Engineering (ICSE), pages 702–703. IEEE.
Benaroch, M. (2021). Third-party induced cyber inci-
dents—much ado about nothing? Journal of Cyberse-
curity, 7(1):tyab020.
Berg, K., Bishop, J., and Muthig, D. (2005). Tracing soft-
ware product line variability: from problem to solu-
tion space. In South African Institute of Computer
Scientists and Information Technologists (SAICSIT),
pages 182–191.
Dietrich, C., Krombholz, K., Borgolte, K., and Fiebig,
T. (2018). Investigating system operators’ perspec-
tive on security misconfigurations. In Conference
on Computer and Communications Security (CCS),
pages 1272–1289. ACM.
Etxeberria, L. and Sagardui, G. (2008). Evaluation of
quality attribute variability in software product fam-
ilies. In nternational Conference on Engineering
of Computer-based Systems (ECBS), pages 255–264.
IEEE.
Fægri, T. E. and Hallsteinsen, S. (2006). A software product
line reference architecture for security. In Software
Product Lines, pages 275–326. Springer.
Fernandez, E. B., Yoshioka, N., and Washizaki, H. (2015).
Patterns for security and privacy in cloud ecosystems.
In International Workshop on Evolving Security and
Privacy Requirements Engineering (ESPRE), pages
13–18. IEEE.
Fernandez, E. B., Yoshioka, N., Washizaki, H., and Syed,
M. H. (2016). Modeling and security in cloud ecosys-
tems. Future Internet, 8(2):13.
Gomes, A. T. A., Ziviani, A., Correa, B. S. P. M., Teixeira,
I. M., and Moreira, V. M. (2012). Splice: A software
product line for healthcare. In International Health
Informatics Symposium (IHI), pages 721–726. ACM.
Guana, V. and Correal, D. (2012). Improving software
product line configuration: A quality attribute-driven
approach. Information and Software Technology,
55(3):541–562.
Hammani, F. Z., Rhanoui, M., and El Asri, B. (2014). To-
wards a variable non-functional requirements integra-
tion for component-based product line a generic ap-
proach. In World Conference on Complex Systems
(WCCS), pages 146–151. IEEE.
Horcas, J. M., Pinto, M., and Fuentes, L. (2013). Variabil-
ity and dependency modeling of quality attributes. In
Conference Series on Software Engineering and Ad-
vanced Applications (SEAA), pages 185–188. IEEE.
Horcas, J.-M., Pinto, M., and Fuentes, L. (2018). Vari-
ability models for generating efficient configurations
of functional quality attributes. Information and Soft-
ware Technology, 95:147–164.
Horcas, J.-M., Pinto, M., and Fuentes, L. (2019). Soft-
ware product line engineering: A practical experi-
ence. In Systems and Software Product Line Confer-
ence (SPLC), pages 164–176. ACM.
Hundt, C., Mehner, K., Pfeiffer, C., and Sokenou, D.
(2007). Improving alignment of crosscutting features
with code in product line engineering. Journal of Ob-
ject Technology, 6(9):417–436.
Iglesias, A., Lu, H., Arellano, C., Yue, T., Ali, S., and Sagar-
dui, G. (2017). Product line engineering of monitor-
ing functionality in industrial cyber-physical systems:
A domain analysis. In Systems and Software Product
Line Conference (SPLC), pages 195–204. ACM.
Ines, A., Khadouma, S., Labed, L., and Ghezala, H. B.
(2011). Towards a secure service oriented product
line. In International Conference on Software En-
gineering Research and Practice (SERP), pages 1–7.
Citeseer.
Iqbal, M., Hafeez, Y., Almashfi, N., Alsirhani, A., Alser-
hani, F., Ali, S., Humayun, M., and Jamal, M. (2024).
Enhancing secure development in globally distributed
software product lines: A machine learning-powered
framework for cyber-resilient ecosystems. Comput-
ers, Materials & Continua, 79(3).
ISO/IEC 27000 (2022). Information technology – Security
techniques – Information security management sys-
tems. Standard, ISO.
Kenner, A., Dassow, S., Lausberger, C., Krüger, J., and Le-
ich, T. (2020). Using variability modeling to support
security evaluations: Virtualizing the right attack sce-
narios. In International Working Conference on Vari-
ability Modelling of Software-Intensive Systems (Va-
MoS), pages 1–9. ACM.
Kenner, A., May, R., Krüger, J., Saake, G., and Leich, T.
(2021). Safety, security, and configurable software
ICSOFT 2025 - 20th International Conference on Software Technologies
84