Follow
Laurens Sion
Laurens Sion
imec-DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
792018
Linddun go: A lightweight approach to privacy threat modeling
K Wuyts, L Sion, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
492020
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
432018
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
392020
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
382019
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
362018
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
292018
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
272020
Security threat modeling: are data flow diagrams enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd international conference on software …, 2020
262020
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
242019
Contextualisation of data flow diagrams for security analysis
S Faily, R Scandariato, A Shostack, L Sion, D Ki-Aries
Graphical Models for Security: 7th International Workshop, GraMSec 2020 …, 2020
162020
A comparison of system description models for data protection by design
P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ...
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019
162019
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
142019
Masc: Modelling architectural security concerns
L Sion, K Yskout, A Van Den Berghe, R Scandariato, W Joosen
2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering …, 2015
132015
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)
D Van Landuyt, L Pasquale, L Sion, W Joosen
2021 International Symposium on Software Engineering for Adaptive and Self …, 2021
122021
DPMF: a modeling framework for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, P Valcke, W Joosen
Enterprise Modelling and Information Systems Architectures (EMISAJ) 15, 10: 1-53, 2020
112020
The never-ending story: On the need for continuous privacy impact assessment
L Sion, D Van Landuyt, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
112020
Systematic quality trade-off support in the software product-line configuration process
L Sion, D Van Landuyt, W Joosen, G de Jong
Proceedings of the 20th International Systems and Software Product Line …, 2016
102016
Automated threat analysis and management in a continuous integration pipeline
L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen
2021 IEEE Secure Development Conference (SecDev), 30-37, 2021
82021
Knowledge is power: Systematic reuse of privacy knowledge for threat elicitation
K Wuyts, L Sion, D Van Landuyt, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 80-83, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20