
ing as enabler for devsecops. IEEE Access, 7:100283–
100295.
ISC
2
(2022). 2022 cybersecurity workforce study. Techni-
cal report, International Information System Security
Certification Consortium.
Ivanova, M. G., Probst, C. W., Hansen, R. R., and
Kamm
¨
uller, F. (2015). Transforming Graphical Sys-
tem Models to Graphical Attack Models. In GraM-
Sec@CSF.
Kordy, B., Kordy, P., Mauw, S., and Schweitzer, P. Adtool:
Security analysis with attack-defense trees. Online.
Last updated: 2015, Accessed: 2025-03-01.
Kordy, B., Kordy, P., Mauw, S., and Schweitzer, P. (2013).
Adtool: security analysis with attack–defense trees.
In Quantitative Evaluation of Systems: 10th Inter-
national Conference, QEST 2013, Buenos Aires, Ar-
gentina, August 27-30, 2013. Proceedings 10, pages
173–176. Springer.
Kumar, R. and Goyal, R. (2020). Modeling continuous se-
curity: A conceptual model for automated devsecops
using open-source software over cloud (adoc). Com-
puters & Security, 97:101967.
Lee, J. S. (2018). The devsecops and agency theory. In 2018
IEEE International Symposium on Software Relia-
bility Engineering Workshops (ISSREW), pages 243–
244.
Li, T., Paja, E., Mylopoulos, J., Horkoff, J., and Beck-
ers, K. (2016). Security attack analysis using attack
patterns. In 2016 IEEE Tenth International Confer-
ence on Research Challenges in Information Science
(RCIS), pages 1–13.
Lipner, S. (2004). The Trustworthy Computing Security
Development Lifecycle. In Proceedings of the 20th
Annual Computer Security Applications Conference,
ACSAC ’04, pages 2–13, Washington, DC, USA.
IEEE Computer Society.
Masaki Oya, Keita Yamamoto, M. H. and Okubo, T. (2025).
Reusable attack tree patterns using common attack
pattern enumeration and classification. In 9th Inter-
national Conference on Cryptography, Security and
Privacy, Okinawa, Japan.
Ministry of the Environment of Japan (2023). Require-
ments definition document for microchip registration
web application. Online. Published: 2022-06-01, Ac-
cessed: 2025-03-01.
MITRE Corporation (2023a). Common attack pattern enu-
meration and classification (capec). Online. Accessed:
2025-03-01.
MITRE Corporation (2023b). Common weakness enumer-
ation (cwe). Online. Accessed: 2025-03-01.
Mohan, V., ben Othmane, L., and Kres, A. (2018). Bp:
Security concerns and best practices for automation
of software deployment processes: An industrial case
study. In 2018 IEEE Cybersecurity Development
(SecDev), pages 21–28.
Moore, A., Ellison, R., and Linger, R. (2001). Attack
Modeling for Information Security and Survivabil-
ity. Technical Report CMU/SEI-2001-TN-001, Soft-
ware Engineering Institute, Carnegie Mellon Univer-
sity, Pittsburgh, PA.
Myrbakken, H. and Colomo-Palacios, R. (2017). Devsec-
ops: A multivocal literature review. In Mas, A.,
Mesquida, A., O’Connor, R. V., Rout, T., and Dorling,
A., editors, Software Process Improvement and Ca-
pability Determination, pages 17–29, Cham. Springer
International Publishing.
Okubo, T. and Kaiya, H. (2022). Efficient secure devops us-
ing process mining and attack defense trees. Procedia
Computer Science, 207:446–455.
OWASP Foundation (2023). Security by design principles.
OWASP Wiki. Accessed: 2025-02-20.
Rahman, A. A. U. and Williams, L. (2016). Software secu-
rity in devops: Synthesizing practitioners’ perceptions
and practices. In 2016 IEEE/ACM International Work-
shop on Continuous Software Evolution and Delivery
(CSED), pages 70–76.
Regainia, L. and Salva, S. (2017). A methodology of secu-
rity pattern classification and of Attack-Defense Tree
generation. In 3nd International Conference on In-
formation Systems Security and Privacy {(ICISSP}
2017, Porto, Portugal, France.
Ross, R., McEvilley, M., and Oren, J. C. (2016). Systems
security engineering: Considerations for a multidis-
ciplinary approach in the engineering of trustworthy
secure systems. Technical Report NIST Special Publi-
cation 800-160 Vol. 1, National Institute of Standards
and Technology. Includes updates as of March 21,
2018.
ICSOFT 2025 - 20th International Conference on Software Technologies
142