Rene Rydhof Hansen
Cited by
Cited by
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
Metamoc: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
10th international workshop on worst-case execution time analysis (WCET 2010), 2010
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
CONCUR’99 Concurrency Theory: 10th International Conference Eindhoven, The …, 1999
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
Abstract interpretation of mobile ambients
R Rydhof Hansen, JG Jensen, F Nielson, HR Nielson
Static Analysis: 6th International Symposium, SAS’99 Venice, Italy …, 1999
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
Formal Modeling and Analysis of Timed Systems: 14th International Conference …, 2016
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
2010 European Dependable Computing Conference, 191-196, 2010
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
Tools and Algorithms for the Construction and Analysis of Systems: 10th …, 2004
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
What is a timing anomaly?
F Cassez, RR Hansen, MC Olesen
12th International Workshop on Worst-Case Execution Time Analysis (2012), 2012
A predictable java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20