Laurens Sion
Laurens Sion
imec-DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
202018
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
92018
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
92018
MASC: modelling architectural security concerns
L Sion, K Yskout, A van Den Berghe, R Scandariato, W Joosen
2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering …, 2015
92015
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
72018
Systematic quality trade-off support in the software product-line configuration process
L Sion, D Van Landuyt, W Joosen, G de Jong
Proceedings of the 20th International Systems and Software Product Line …, 2016
52016
A comparison of system description models for data protection by design
P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ...
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019
32019
Poster: Knowledge-enriched security and privacy threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
32018
Towards systematically addressing security variability in software product lines
L Sion, D Van Landuyt, K Yskout, W Joosen
Proceedings of the 20th International Systems and Software Product Line …, 2016
32016
An Architectural View for Data Protection by Design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
22019
Privacy Risk Assessment for Data Subject-aware Threat Modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
12019
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications
D Van Landuyt, L Sion, E Vandeloo, W Joosen
Computer Security, 195-203, 2019
2019
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation
K Wuyts, L Sion, D Van Landuyt, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 80-83, 2019
2019
Towards Automated Security Design Flaw Detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
2019
Poster: Privacy Risk Assessment for Data Subject-aware Threat Modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
40th IEEE Symposium on Security and Privacy, Date: 2019/05/20-2019/05/22 …, 2019
2019
A Modular Meta-model for Security Solutions
L Sion, K Yskout, R Scandariato, W Joosen
Companion to the first International Conference on the Art, Science and …, 2017
2017
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
A Comparison of System Description Models for Data Protection by Design
K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, W Joosen
Proceedings of the ACM Symposium on Applied Computing 34, 0
SEAD 2018
L Williams, P Rotella, L Sion, K Yskout, D Van Landuyt, A Peruma, D Krutz
The system can't perform the operation now. Try again later.
Articles 1–19