Follow
Laurens Sion
Laurens Sion
imec-DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
522018
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
262018
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
252018
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
202019
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
172018
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
152020
Linddun go: A lightweight approach to privacy threat modeling
K Wuyts, L Sion, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
132020
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
132019
Masc: Modelling architectural security concerns
L Sion, K Yskout, A van Den Berghe, R Scandariato, W Joosen
2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering …, 2015
132015
Security Threat Modeling: Are Data Flow Diagrams Enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd International Conference on Software …, 2020
102020
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
102019
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
2020 IEEE/ACM 42nd International Conference on Software Engineering: New …, 2020
92020
A comparison of system description models for data protection by design
P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ...
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019
92019
Contextualisation of data flow diagrams for security analysis
S Faily, R Scandariato, A Shostack, L Sion, D Ki-Aries
International Workshop on Graphical Models for Security, 186-197, 2020
82020
Towards systematically addressing security variability in software product lines
L Sion, D Van Landuyt, K Yskout, W Joosen
Proceedings of the 20th International Systems and Software Product Line …, 2016
72016
Systematic quality trade-off support in the software product-line configuration process
L Sion, D Van Landuyt, W Joosen, G de Jong
Proceedings of the 20th International Systems and Software Product Line …, 2016
72016
DPMF: a modeling framework for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, P Valcke, W Joosen
Enterprise Modelling and Information Systems Architectures (EMISAJ) 15, 10: 1-53, 2020
62020
Poster: Knowledge-enriched security and privacy threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
42018
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)
D Van Landuyt, L Pasquale, L Sion, W Joosen
2021 International Symposium on Software Engineering for Adaptive and Self …, 2021
32021
The never-ending story: On the need for continuous privacy impact assessment
L Sion, D Van Landuyt, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20