
Koen Yskout
About me
As research manager in the DistriNet research group of KU Leuven, I take care of the secure software engineering (security by design) research track. This comprises processes, methodologies, models, design notations and formalisms, and empirical evaluations of those.
Previously, as a postdoctoral researcher, I've worked on empirical evaluations of secure software architecture design techniques. In my PhD thesis, I have empirically investigated the use of (security) patterns for crossing the gap between security requirements and software architecture, and proposed an approach to co-evolve security requirements and software architecture based on patterns. I have also explored techniques for automated transformations between a set of security requirements and a secure architecture.
Research interests
My research interests include all aspects of secure software engineering, with special attention to security by design aspects, such as
- Architectural design and analysis methods, models, notations and formalisms
- Empirical validation of secure design approaches
- Security patterns
- Security requirements engineering
- Model-driven techniques for security
Besides that, I also strive to follow up on recent developments in the general software engineering space.
Key publications:
- Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van den Berghe, Wouter Joosen, Security Threat Modeling: Are Data Flow Diagrams Enough?, The 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW?20), pages 254-257, Seoul, Republic of Korea, May 23-29, 2020
- Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen, Threat modeling: from infancy to maturity, (eds. Gregg Rothermel, Doo-Hwan Bae), International Conference on Software Engineering, International Conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER'20), pages 9-12, Seoul, South Korea, May 23-29, 2020
- Koen Yskout, Riccardo Scandariato, Wouter Joosen, Do security patterns really help designers?, (eds. Antonia Bertolino, Gerardo Canfora, Sebastian G Elbaum), International Conference on Software Engineering (ICSE) , Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on , volume 1, pages 292-302, Firenze, Italy, May 16-24, 2015
- Koen Yskout, Riccardo Scandariato, Wouter Joosen, Does organizing security patterns focus architectural choices?, (eds. M. Glinz, G. Murphy, M. Pezze), ICSE , 34th International Conference on Software Engineering (ICSE 2012) , volume 1, pages 617-627, Zurich, Switserland, June 2-9, 2012
- Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen, An analysis of the security patterns landscape, Third International Workshop on Software Engineering for Secure Systems , Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007) , pages 1-7, Minneapolis, Minnesota USA, May 19-20, 2007