Kim Wuyts

Kim Wuyts

 About me

I am a postdoctoral researcher at the Department of Computer Science of the Katholieke Universiteit Leuven, Belgium.
I am a member of the Security: Development processes And Middleware taskforce of the DistriNet Research Group.

I have more than 10 years of experience in security and privacy in software engineering. I am one of the main forces behind the development and extension of LINDDUN, a privacy-by-design framework that provides systematic support to elicit and mitigate privacy threats in software systems.

My main research interests are security and privacy in software engineering.

 

Projects

Current projects:

 

  • PRiSE: bridging the gap between legal and architectural data protection requirements
  • HEART: Health-related activity recognition system based on IoT

Previous projects: E-HIPShare4HealthBraveHealthO'Care CloudsTRU-BLISS

 


Research

linddun logo

LINDDUN is our in-house developed Privacy by Design framework which was developed and empirically validated during my PhD.

Our team is continuously working on applying, validating, and improving the LINDDUN Privacy by Design framework. 

More information about the framework is available on the LINDDUN website.

 

 

 

Key publications:

  1. Kim Wuyts (supervisors: Wouter Joosen, Riccardo Scandariato), Privacy Threats in Software Architectures, Ph.D. Thesis, Doctor of Engineering Science (PhD) (Leuven), KU Leuven, January 16, 2015 download0 1656390bibtex   1656390lirias
  2. Kim Wuyts, Riccardo Scandariato, Wouter Joosen, Empirical evaluation of a privacy-focused threat modeling methodology, The Journal of Systems and Software , volume 96, pages 122-138, Elsevier Inc., October, 2014 349550bibtex   349550lirias 349550doi
  3. Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, Wouter Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering Journal , volume 16, issue 1, pages 3-32, Springer-Verlag, 2011 349551bibtex   349551lirias 349551doi
  4. Riccardo Scandariato, Kim Wuyts, Wouter Joosen, A descriptive study of Microsoft's threat modeling technique, Requirements Engineering, volume 20, issue 2, pages 163-180, Springer-Verlag, December, 2013 download0 349543bibtex   349543lirias 349543doi
  5. Kim Wuyts, Riccardo Scandariato, Wouter Joosen, LIND(D)UN privacy threat tree catalog, CW Reports, CW Reports CW675, Department of Computer Science, KU Leuven, Leuven, Belgium, September, 2014 download0 1656217bibtex   1656217lirias
[More...]
 

 Teaching

I have been involved in the educational tasks for the following courses:

 
Reviewing

 

 

Contact info

  • Office: 04.151
  • Address:
    Dept. Computer Science
    Celestijnenlaan 200A - bus 2402
    B-3001 Heverlee
    BELGIUM
  • Tel: +32 16 372615
  • Fax: +32 16 327996
  • Email: Kim Wuyts