Rene Rydhof Hansen
Rene Rydhof Hansen
Adresse e-mail validée de cs.aau.dk - Page d'accueil
Titre
Citée par
Citée par
Année
Documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, J Lawall, RR Hansen, G Muller
Acm sigops operating systems review 42 (4), 247-260, 2008
2392008
Validating firewalls in mobile ambients
F Nielson, HR Nielson, RR Hansen, JG Jensen
International Conference on Concurrency Theory, 463-477, 1999
1001999
Metamoc: Modular execution time analysis using model checking
AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen
10th international workshop on worst-case execution time analysis (WCET 2010), 2010
942010
Abstract interpretation of mobile ambients
RR Hansen, JG Jensen, F Nielson, HR Nielson
International Static Analysis Symposium, 134-148, 1999
871999
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009
722009
A foundation for flow-based program matching: using temporal logic and model checking
J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
702009
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
682006
Validating firewalls using flow logics
F Nielson, HR Nielson, RR Hansen
Theoretical Computer Science 283 (2), 381-418, 2002
662002
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
582008
Finding error handling bugs in openssl using coccinelle
J Lawall, B Laurie, RR Hansen, N Palix, G Muller
2010 European Dependable Computing Conference, 191-196, 2010
452010
The succinct solver suite
F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2004
422004
Abstract interpretation of mobile ambients
F Nielson, RR Hansen, HR Nielson
Science of Computer Programming 47 (2-3), 145-175, 2003
362003
Formalisation and analysis of Dalvik bytecode
ER Wognsen, HS Karlsen, MC Olesen, RR Hansen
Science of Computer Programming 92, 25-55, 2014
342014
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
322015
Modelling attack-defense trees using timed automata
O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ...
International Conference on Formal Modeling and Analysis of Timed Systems, 35-50, 2016
312016
A predictable Java profile: rationale and implementations
T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard
Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009
292009
Semantic patches for documenting and automating collateral evolutions in Linux device drivers
Y Padioleau, RR Hansen, JL Lawall, G Muller
Proceedings of the 3rd workshop on Programming languages and operating …, 2006
292006
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
262006
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
222015
Flow logic for carmel
RR Hansen
The 13th Nordic Workshop on Programming Theory, 2002
202002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20