
4.4 Discussion
4.4.1 Limitations
In the conformance assessment, several tasks require
manual intervention. For example, verifying that a la-
bel with the product model number is on the body of
an IoT device is challenging to fully automate. How-
ever, the evaluation of most security requirements
can be automated. Therefore, in streamlining manual
work, the proposed automation tool is effective.
4.4.2 Collection of Technical Information
In both document analysis and device testing, it is
necessary to verify the technical documentation re-
lated to the IoT device. However, user manuals and
other documents often lack sufficiently detailed infor-
mation, making it difficult to evaluate conformance
with security requirements. Therefore, it is crucial to
collect a wide variety of technical information related
to the IoT devices under inspection. Determining how
to automatically gather this relevant information re-
mains an issue for future work.
5 CONCLUSION
In this paper, we propose a method of automating
the conformance assessment of security requirements
based on JC-STAR. The proposed method consists
of document analysis and device testing. In doc-
ument analysis, the use of rewrite-retrieve-read and
CoT within RAG increases the assessment accuracy.
In device testing, conformance with security require-
ments is assessed by applying tools and interpreting
the results with an LLM. The experimental results
show that the proposed method assesses conformance
with security requirements with an accuracy of 95%
in the best case.
Future work includes quantifying the certainty of
evaluation results and providing rationales. This is ex-
pected to enhance the reliability of inspection results.
Additionally, examining differences arising from lan-
guage variations in security requirements and user
manuals also included.
ACKNOWLEDGEMENTS
The results of this research were obtained
in part through a contract research project
(JPJ012368C08101) sponsored by the National
Institute of Information and Communications
Technology (NICT).
REFERENCES
Douze, M., Guzhva, A., Deng, C., Johnson, J., Szilvasy, G.,
Mazar
´
e, P.-E., Lomeli, M., Hosseini, L., and J
´
egou, H.
(2024). The faiss library.
ETSI (2024). Cyber security for consumer internet of
things: Baseline requirements, ETSI EN 303 645
V3.1.3.
Fagan, M., Megas, K., Watrobski, P., Marron, J., and
Cuthill, B. (2022). Profile of the iot core baseline for
consumer iot products, NIST IR 8425.
Information-technology Promotion Agency (2024). Japan
cyber star (jc-star). https://www.ipa.go.jp/en/security/
jc-star/index.html.
Jiang, A. Q., Sablayrolles, A., Mensch, A., Bamford,
C., Chaplot, D. S., de las Casas, D., Bressand, F.,
Lengyel, G., Lample, G., Saulnier, L., Lavaud, L. R.,
Lachaux, M.-A., Stock, P., Scao, T. L., Lavril, T.,
Wang, T., Lacroix, T., and Sayed, W. E. (2023). Mis-
tral 7b.
Kaksonen, R., Halunen, K., Laakso, M., and R
¨
oning, J.
(2024). Automating iot security standard testing by
common security tools. In Proceedings of the 10th
International Conference on Information Systems Se-
curity and Privacy, pages 42–53. SCITEPRESS.
Kim, M., Kim, D., Kim, E., Kim, S., Jang, Y., and Kim, Y.
(2020). Firmae: Towards large-scale emulation of iot
firmware for dynamic analysis. In Proceedings of the
36th Annual Computer Security Applications Confer-
ence, pages 733–745. Association for Computing Ma-
chinery.
Lewis, P. S. H., Perez, E., Piktus, A., Petroni, F.,
Karpukhin, V., Goyal, N., K
¨
uttler, H., Lewis, M.,
tau Yih, W., Rockt
¨
aschel, T., Riedel, S., and Kiela,
D. (2020). Retrieval-augmented generation for
knowledge-intensive nlp tasks. In NeurIPS.
Ma, X., Gong, Y., He, P., Zhao, H., and Duan, N. (2023).
Query rewriting in retrieval-augmented large language
models. In Empirical Methods in Natural Language
Processing, EMNLP, pages 5303–5315.
Reimers, N. and Gurevych, I. (2019). Sentence-bert: Sen-
tence embeddings using siamese bert-networks. In
Proceedings of the 2019 Conference on Empirical
Methods in Natural Language Processing. Associa-
tion for Computational Linguistics.
Wei, J., Wang, X., Schuurmans, D., Bosma, M., Xia, F.,
Chi, E., Le, Q. V., Zhou, D., et al. (2022). Chain-of-
thought prompting elicits reasoning in large language
models. Advances in neural information processing
systems, 35:24824–24837.
Xiao, S., Liu, Z., Zhang, P., Muennighoff, N., Lian, D.,
and Nie, J.-Y. (2024). C-pack: Packed resources
for general chinese embeddings. In Proceedings of
the 47th International ACM SIGIR Conference on
Research and Development in Information Retrieval,
pages 641–649. Association for Computing Machin-
ery.
IoTBDS 2025 - 10th International Conference on Internet of Things, Big Data and Security
312