Rene Rydhof Hansen
Cited by
Cited by
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
Metamoc: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
10th international workshop on worst-case execution time analysis (WCET 2010), 2010
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
International Conference on Concurrency Theory, 463-477, 1999
Abstract interpretation of mobile ambients
R Rydhof Hansen, JG Jensen, F Nielson, HR Nielson
International Static Analysis Symposium, 134-148, 1999
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
2010 European Dependable Computing Conference, 191-196, 2010
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2004
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
A predictable java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
From flow logic to static type systems for coordination languages
R De Nicola, D Gorla, RR Hansen, F Nielson, HR Nielson, CW Probst, ...
Science of Computer Programming 75 (6), 376-397, 2010
The system can't perform the operation now. Try again later.
Articles 1–20