Rene Rydhof Hansen
TitleCited byYear
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
1912008
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
International Conference on Concurrency Theory, 463-477, 1999
971999
Abstract interpretation of mobile ambients
RR Hansen, JG Jensen, F Nielson, HR Nielson
International Static Analysis Symposium, 134-148, 1999
821999
METAMOC: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
OASIcs-OpenAccess Series in Informatics 15, 2010
812010
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International …, 2009
652009
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
652002
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
612006
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Acm Sigplan Notices 44 (1), 114-126, 2009
582009
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
502008
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2004
412004
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
Dependable Computing Conference (EDCC), 2010 European, 191-196, 2010
362010
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
352003
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
272006
A predictable Java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
262009
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
252015
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
242014
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
Availability, Reliability and Security, 2006. ARES 2006. The First …, 2006
242006
Flow logic for carmel
RR Hansen
The 13th Nordic Workshop on Programming Theory, 2002
192002
Analysing access control specifications
CW Probst, RR Hansen
Systematic Approaches to Digital Forensic Engineering, 2009. SADFE'09 …, 2009
172009
Private memory allocation analysis for safety-critical Java
AE Dalsgaard, RR Hansen, M Schoeberl
Proceedings of the 10th International Workshop on Java Technologies for Real …, 2012
162012
The system can't perform the operation now. Try again later.
Articles 1–20