Publications

Our academic publications related to LINDDUN and threat modeling in general are listed below.

LINDDUN-specific publications

Kim Wuyts, Laurens Sion, Wouter Joosen, LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling, International Workshop on Privacy Engineering 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genova, Italy, September 7, 2020 (Describes the creation of LINDDUN GO) [Presentation link]

Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen, Interaction-based privacy threat elicitation, International Workshop on Privacy Engineering 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 79-86, London, April 27, 2018

Kim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen, Effective and Efficient Privacy Threat Modeling through Domain Refinements, 33rd Annual ACM Symposium on Applied Computing (ACM SAC), 4 pages, Univ Pau Pays Adour, Pau, France, April 9-13, 2018 

Kim Wuyts, Wouter Joosen, LINDDUN privacy threat modeling: a tutorial, CW Reports, CW Reports CW685, Department of Computer Science, KU Leuven, Leuven, Belgium, July, 2015

Kim Wuyts (supervisors: Wouter Joosen, Riccardo Scandariato), Privacy Threats in Software Architectures, Ph.D. Thesis, Doctor of Engineering Science (PhD) (Leuven), KU Leuven, January 16, 2015 (Describes version 1 and 2 of LINDDUN)

Kim Wuyts, Riccardo Scandariato, Wouter Joosen, Empirical evaluation of a privacy-focused threat modeling methodology, The Journal of Systems and Software , volume 96, pages 122-138, Elsevier Inc., October, 2014 (Empirical evaluation of LINDDUN)

Kim Wuyts, Riccardo Scandariato, Wouter Joosen, LIND(D)UN privacy threat tree catalog, CW Reports, CW Reports CW675, Department of Computer Science, KU Leuven, Leuven, Belgium, September, 2014 (The catalog contains version 2 of the LINDDUN threat trees (also available online))

Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, Wouter Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering Journal , volume 16, issue 1, pages 3-32, Springer-Verlag, 2011 (This is the original LINDDUN paper.)

Threat modeling related publications

Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen, Threat modeling: from infancy to maturity, International Conference on Software Engineering, International Conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER'20), Seoul, South Korea, May 23-29, 2020 [Presentation link]

Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Wouter Joosen, Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation, International Workshop on Privacy Engineering 2019, 2019 IEEE Security and Privacy Workshops (SPW), pages 80-83, San Francisco, May 23 - April 23, 2019

Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen, Privacy Risk Assessment for Data Subject-aware Threat Modeling, International Workshop on Privacy Engineering 2019, 2019 IEEE Security and Privacy Workshops (SPW), pages 64-71, San Francisco, May 23, 2019

Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen, SPARTA: Security & privacy architecture through risk-driven threat assessment, International Conference on Software Architecture, 2018 IEEE International Conference on Software Architecture Companion (ICSA-C), pages 96-99, Seattle, United States, April 30 - May 4, 2018

Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen, Solution-aware Data Flow Diagrams for Security Threat Modeling, 33rd Annual ACM Symposium on Applied Computing (ACM SAC), 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 8 pages, Univ Pau Pays Adour, Pau, FRANCE, April 9-13, 2018 

Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen, Risk-based Design Security Analysis, 1st IEEE/ACM International Workshop on Security Awareness from Design to Deployment (SEAD), 2018, volume 1, 8 pages, Gothenburg, SWEDEN, May 27 - June 3, 2018 

Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen, Knowledge-enriched Security and Privacy Threat Modeling, 40th ACM/IEEE International Conference on Software Engineering (ICSE), 2 pages, Gothenburg, SWEDEN, May 27 - June 3, 2018

Riccardo Scandariato, Kim Wuyts, Wouter Joosen, A descriptive study of Microsoft's threat modeling technique, Requirements Engineering , volume 20, issue 2, pages 1-18, Springer-Verlag, December, 2013

DistriNet Research Group 

KU Leuven

Dept. Computer Science 

Celestijnenlaan 200A (postbox 2402) 

200A B-3001 Heverlee BELGIUM 

  • White Facebook Icon
  • White Twitter Icon

© 2020  DistriNet KU Leuven