Rene Rydhof Hansen
TitleCited byYear
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
2292008
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
International Conference on Concurrency Theory, 463-477, 1999
1011999
Metamoc: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
10th international workshop on worst-case execution time analysis (WCET 2010), 2010
922010
Abstract interpretation of mobile ambients
RR Hansen, JG Jensen, F Nielson, HR Nielson
International Static Analysis Symposium, 134-148, 1999
851999
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009
702009
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
682009
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
662006
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
652002
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
562008
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2004
432004
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
2010 European Dependable Computing Conference, 191-196, 2010
422010
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
352003
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
322014
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
302015
A predictable Java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
282009
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
272016
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
272006
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
262006
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
222015
Flow logic for carmel
RR Hansen
The 13th Nordic Workshop on Programming Theory, 2002
202002
The system can't perform the operation now. Try again later.
Articles 1–20