Koen Yskout

Koen Yskout

About me

As research manager in the DistriNet research group of KU Leuven, I take care of the secure software engineering (security by design) research track. This comprises processes, methodologies, models, design notations and formalisms, and empirical evaluations of those.

Previously, as a postdoctoral researcher, I've worked on empirical evaluations of secure software architecture design techniques. In my PhD thesis, I have empirically investigated the use of (security) patterns for crossing the gap between security requirements and software architecture, and proposed an approach to co-evolve security requirements and software architecture based on patterns. I have also explored techniques for automated transformations between a set of security requirements and a secure architecture.

Research interests

My research interests include all aspects of secure software engineering, with special attention to security by design aspects, such as

  • Architectural design and analysis methods, models, notations and formalisms
  • Empirical validation of secure design approaches
  • Security patterns
  • Security requirements engineering
  • Model-driven techniques for security

Besides that, I also strive to follow up on recent developments in the general software engineering space.

 

Key publications:

  1. Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van den Berghe, Wouter Joosen, Security Threat Modeling: Are Data Flow Diagrams Enough?, The 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW?20), pages 254-257, Seoul, Republic of Korea, May 23-29, 2020 download0   3010840lirias 3010840doi
  2. Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen, Threat modeling: from infancy to maturity, (eds. Gregg Rothermel, Doo-Hwan Bae), International Conference on Software Engineering, International Conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER'20), pages 9-12, Seoul, South Korea, May 23-29, 2020 download0   2947593lirias 2947593doi
  3. Koen Yskout, Riccardo Scandariato, Wouter Joosen, Do security patterns really help designers?, (eds. Antonia Bertolino, Gerardo Canfora, Sebastian G Elbaum), International Conference on Software Engineering (ICSE) , Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on , volume 1, pages 292-302, Firenze, Italy, May 16-24, 2015 download0 336637bibtex   336637lirias 336637doi
  4. Koen Yskout, Riccardo Scandariato, Wouter Joosen, Does organizing security patterns focus architectural choices?, (eds. M. Glinz, G. Murphy, M. Pezze), ICSE , 34th International Conference on Software Engineering (ICSE 2012) , volume 1, pages 617-627, Zurich, Switserland, June 2-9, 2012 download0 336631bibtex   336631lirias 336631doi
  5. Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen, An analysis of the security patterns landscape, Third International Workshop on Software Engineering for Secure Systems , Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007) , pages 1-7, Minneapolis, Minnesota USA, May 19-20, 2007 1465148bibtex   1465148lirias 1465148doi
[More...]
 

 

Contact info

  • Office: 02.152
  • Address:
    Dept. Computer Science
    Celestijnenlaan 200A - bus 2402
    B-3001 Heverlee
    BELGIUM
  • Tel: +32 16 372608
  • Fax: +32 16 327996
  • Email: Koen Yskout