
its comprehensive methodology, ACCURATE en-
hanced the traditional continuous development pro-
cesses, which often neglect the critical need for on-
going vigilance post-deployment and promote col-
laboration among stakeholders. Looking ahead, fur-
ther research and development are needed to refine
and expand the ACCURATE proposal. Key areas for
future work include providing and prototype imple-
mentation of the ACCURATE architecture and con-
ducting pilot studies to evaluate the effectiveness of
ACCURATE in diverse operational contexts and re-
fine its features based on empirical feedback. Part
of the future activity is also to establish collabora-
tions with academic, industrial, and regulatory bod-
ies to promote awareness and best practices surround-
ing the ACCURATE approach, helping to establish
a broader security culture within the technology sec-
tor. By pursuing these future directions, the ACCU-
RATE initiative aims to solidify its role as a transfor-
mative force in cybersecurity, ensuring that software
and hardware systems remain secure and reliable in
an ever-evolving digital landscape.
ACKNOWLEDGEMENTS
This work was partially supported by the project
project SERICS (PE00000014) under the NRRP
MUR program funded by the NextGenerationEU.
REFERENCES
Alrashdi, I., Sallam, K. M., Alrowaily, M. A., Alruwaili,
O., and Arain, B. (2024). FIDWATCH: federated in-
cremental distillation for continuous monitoring of iot
security threats. Ad Hoc Networks, 165:103637.
Aouni, F. E., Moumane, K., Idri, A., Najib, M., and Jan,
S. U. (2025). A systematic literature review on agile,
cloud, and devops integration: Challenges, benefits.
Inf. Softw. Technol., 177:107569.
Azad, N. and Hyrynsalmi, S. (2023). Devops critical suc-
cess factors - A systematic literature review. Inf. Softw.
Technol., 157:107150.
Baird, A., Pearce, H., Pinisetty, S., and Roop, P. (2022).
Runtime interchange of enforcers for adaptive attacks:
A security analysis framework for drones. In 2022
20th ACM-IEEE MEMOCODE, pages 1–11. IEEE.
Calabr
`
o, A., Daoudagh, S., Marchetti, E., Aktouf, O., and
Mercier, A. (2024). Human-centric dev-x-ops process
for trustworthiness in ai-based systems. In Garc
´
ıa-
Pe
˜
nalvo, F. J., Aberer, K., and Marchiori, M., editors,
WEBIST 2024, Porto, Portugal, pages 288–295.
Daoudagh, S., Marchetti, E., and Aktouf, O. (2024).
2hcdl: Holistic human-centered development lifecy-
cle. CoRR, abs/2405.01566.
Hosseingholizadeh, A., Rahmati, F., Ali, M., Damadi, H.,
and Liu, X. (2024). Privacy-preserving joint data and
function homomorphic encryption for cloud software
services. IEEE Internet Things J., 11(1):728–741.
Kawaguchi, N., Hart, C., and Uchiyama, H. (2024). Under-
standing the effectiveness of SBOM generation tools
for manually installed packages in docker containers.
J. Internet Serv. Inf. Secur., 14(3):191–212.
Kornecki, A. J. and Zalewski, J. (2010). Safety and secu-
rity in industrial control. In Sheldon, F. T., Prowell,
S. J., Abercrombie, R. K., and Krings, A. W., editors,
CSIIRW 2010, Oak Ridge, TN, USA, page 77. ACM.
Kuznetsov, O., Kanonik, D., Rusnak, A., Yezhov, A., and
Domin, O. (2024). Adaptive restructuring of merkle
and verkle trees for enhanced blockchain scalability.
CoRR, abs/2403.00406.
Li, R., Abendroth, D., Lin, X., Guo, Y., Baek, H. W., Eide,
E., Ricci, R., and van der Merwe, J. E. (2015). Potas-
sium: penetration testing as a service. In ACM Sym-
posium on Cloud Computing, SoCC, Hawaii, 2015,
pages 30–42. ACM.
Ma, J. (2024). 2024 annual report on implementation.
FDD’s Center on Cyber and Technology Innovation.
Rajapakse, R. N., Zahedi, M., Babar, M. A., and Shen, H.
(2022). Challenges and solutions when adopting de-
vsecops: A systematic review. Information and soft-
ware technology, 141:106700.
Roy, U. and Ghosh, N. (2024). Fabman: A framework for
ledger storage and size management for hyperledger
fabric-based iot applications. IEEE Trans. Netw. Serv.
Manag., 21(3):3140–3151.
Sadique, F., Cheung, S., Vakilinia, I., Badsha, S., and Sen-
gupta, S. (2018). Automated structured threat in-
formation expression (stix) document generation with
privacy preservation. In 2018 UEMCON, pages 847–
853.
Shepherd, C. and Markantonakis, K. (2024). Trusted Exe-
cution Environments. Springer.
Syed, N., Khan, M. A., Mohammad, N., Brahim, G. B.,
and Baig, Z. (2022). Unsupervised machine learning
for drone forensics through flight path analysis. In
2022 10th International Symposium on Digital Foren-
sics and Security (ISDFS), pages 1–6. IEEE.
Wurster, M., Breitenb
¨
ucher, U., and et al., A. B. (2021). Au-
tomating the deployment of distributed applications
by combining multiple deployment technologies. In
CLOSER 2021, pages 178–189. SCITEPRESS.
Yang, L., Wang, M., and Lou, W. (2025). An automated
dynamic quality assessment method for cyber threat
intelligence. Comput. Secur., 148:104079.
Zimmermann, O., Pautasso, C., Kapferer, S., and Stocker,
M. (2024). Continuous integration and delivery
in open source development and pattern publishing:
Lessons learned with tool setup and pipeline evolu-
tion. IEEE Softw., 41(1):9–18.
WEBIST 2025 - 21st International Conference on Web Information Systems and Technologies
164