Rene Rydhof Hansen
Cited by
Cited by
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
International Conference on Concurrency Theory, 463-477, 1999
Metamoc: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
10th international workshop on worst-case execution time analysis (WCET 2010), 2010
Abstract interpretation of mobile ambients
RR Hansen, JG Jensen, F Nielson, HR Nielson
International Static Analysis Symposium, 134-148, 1999
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
2010 European Dependable Computing Conference, 191-196, 2010
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2004
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
A predictable Java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
Flow logic for carmel
RR Hansen
The 13th Nordic Workshop on Programming Theory, 2002
The system can't perform the operation now. Try again later.
Articles 1–20