BibTeX records: René Rydhof Hansen

download as .bib file

@inproceedings{DBLP:conf/noms/HagemanKHP22,
  author       = {Kaspar Hageman and
                  Egon Kidmose and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  title        = {Understanding the Challenges of Blocking Unnamed Network Traffic},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789854},
  doi          = {10.1109/NOMS54207.2022.9789854},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/HagemanKHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlesingerCPH22,
  author       = {Ian Slesinger and
                  Lizzie Coles{-}Kemp and
                  Niki Panteli and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Designing Through The Stack: The Case for a Participatory Digital
                  Security By Design},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {45--59},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584322},
  doi          = {10.1145/3584318.3584322},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/AroraHLLP22,
  author       = {Shiraj Arora and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Danny B{\o}gsted Poulsen},
  editor       = {Owolabi Legunsen and
                  Grigore Rosu},
  title        = {Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued
                  Signals},
  booktitle    = {Model Checking Software - 28th International Symposium, {SPIN} 2022,
                  Virtual Event, May 21, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13255},
  pages        = {61--78},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15077-7\_4},
  doi          = {10.1007/978-3-031-15077-7\_4},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spin/AroraHLLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/HansenLLJP21,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Peter Gj{\o}l Jensen and
                  Danny B{\o}gsted Poulsen},
  title        = {ADTLang: a programming language approach to attack defense trees},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {23},
  number       = {1},
  pages        = {89--104},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10009-020-00593-w},
  doi          = {10.1007/S10009-020-00593-W},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/HansenLLJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/NielsonHN21,
  author       = {Flemming Nielson and
                  Ren{\'{e}} Rydhof Hansen and
                  Hanne Riis Nielson},
  editor       = {Daniel Dougherty and
                  Jos{\'{e}} Meseguer and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Paul D. Rowe},
  title        = {Benign Interaction of Security Domains},
  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
                  on the Occasion of his 66.66th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {312--331},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91631-2\_17},
  doi          = {10.1007/978-3-030-91631-2\_17},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/NielsonHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/AgapeDH021,
  author       = {Andrei{-}Alexandru Agape and
                  Madalin Claudiu Danceanu and
                  Ren{\'{e}} Rydhof Hansen and
                  Stefan Schmid},
  title        = {P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes},
  booktitle    = {{ICDCN} '21: International Conference on Distributed Computing and
                  Networking, Virtual Event, Nara, Japan, January 5-8, 2021},
  pages        = {16--25},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3427796.3427798},
  doi          = {10.1145/3427796.3427798},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/AgapeDH021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HagemanHP21,
  author       = {Kaspar Hageman and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Gollector: Measuring Domain Name Dark Matter from Different Vantage
                  Points},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_8},
  doi          = {10.1007/978-3-030-91625-1\_8},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HagemanHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MollerSJPBCPLHJ21,
  author       = {Bjarke Hilmer M{\o}ller and
                  Jacob Gosch S{\o}ndergaard and
                  Kristoffer Skagb{\ae}k Jensen and
                  Magnus Winkel Pedersen and
                  Tobias Worm B{\o}gedal and
                  Anton Christensen and
                  Danny B{\o}gsted Poulsen and
                  Kim Guldstrand Larsen and
                  Ren{\'{e}} Rydhof Hansen and
                  Thomas Rosted Jensen and
                  Heino Juvoll Madsen and
                  Henrik Uhrenfeldt},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Preliminary Security Analysis, Formalisation, and Verification of
                  OpenTitan Secure Boot Code},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_11},
  doi          = {10.1007/978-3-030-91625-1\_11},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MollerSJPBCPLHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HagemanKHP21,
  author       = {Kaspar Hageman and
                  Egon Kidmose and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Can a {TLS} Certificate Be Phishy?},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {38--49},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010516600380049},
  doi          = {10.5220/0010516600380049},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HagemanKHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isola/NielsonHN20,
  author       = {Flemming Nielson and
                  Ren{\'{e}} Rydhof Hansen and
                  Hanne Riis Nielson},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Adaptive Security Policies},
  booktitle    = {Leveraging Applications of Formal Methods, Verification and Validation:
                  Engineering Principles - 9th International Symposium on Leveraging
                  Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October
                  20-30, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12477},
  pages        = {280--294},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61470-6\_17},
  doi          = {10.1007/978-3-030-61470-6\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isola/NielsonHN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PanumHHP20,
  author       = {Thomas Kobber Panum and
                  Kaspar Hageman and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Tamara Denning and
                  Tyler Moore},
  title        = {Towards Adversarial Phishing Detection},
  booktitle    = {13th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2020, August 10, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/cset20/presentation/panum},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PanumHHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/DharanikotJKMPH19,
  author       = {Samvid Dharanikot and
                  Michael Toft Jensen and
                  Sebastian Rom Kristensen and
                  Mathias Sass Michno and
                  Yvonne{-}Anne Pignolet and
                  Ren{\'{e}} Rydhof Hansen and
                  Stefan Schmid},
  title        = {Breeding Unicorns: Developing Trustworthy and Scalable Randomness
                  Beacons},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {99--106},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00022},
  doi          = {10.1109/BLOCKCHAIN.2019.00022},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/DharanikotJKMPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ew/NielsenHL19,
  author       = {Lars Nielsen and
                  Ren{\'{e}} Rydhof Hansen and
                  Daniel E. Lucani},
  title        = {A Multi-Threaded Approach to Encoding with Random Linear Network Coding},
  booktitle    = {25th European Wireless Conference, {EW} 2019, Aarhus, Denmark, May
                  2-4, 2019},
  pages        = {1--7},
  publisher    = {{VDE} / {IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/document/8835934},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ew/NielsenHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalt/PanumHPH19,
  author       = {Thomas Kobber Panum and
                  Kaspar Hageman and
                  Jens Myrup Pedersen and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Maiga Chang and
                  Demetrios G. Sampson and
                  Ronghuai Huang and
                  Alex Sandro Gomes and
                  Nian{-}Shing Chen and
                  Ig Ibert Bittencourt and
                  Kinshuk and
                  Diego Dermeval and
                  Ibsen Mateus Bittencourt},
  title        = {Haaukins: {A} Highly Accessible and Automated Virtualization Platform
                  for Security Education},
  booktitle    = {19th {IEEE} International Conference on Advanced Learning Technologies,
                  {ICALT} 2019, Macei{\'{o}}, Brazil, July 15-18, 2019},
  pages        = {236--238},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICALT.2019.00073},
  doi          = {10.1109/ICALT.2019.00073},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalt/PanumHPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/PanumHP19,
  author       = {Thomas Kobber Panum and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Stefano Secci and
                  Isabelle Chrisment and
                  Marco Fiore and
                  Lionel Tabourier and
                  Keun{-}Woo Lim},
  title        = {Kraaler: {A} User-Perspective Web Crawler},
  booktitle    = {Network Traffic Measurement and Analysis Conference, {TMA} 2019, Paris,
                  France, June 19-21, 2019},
  pages        = {153--160},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/TMA.2019.8784660},
  doi          = {10.23919/TMA.2019.8784660},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/PanumHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2019,
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0},
  doi          = {10.1007/978-3-030-35055-0},
  isbn         = {978-3-030-35054-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/HansenP18,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Christian W. Probst},
  title        = {Modelling and Analysing Overlay Networks by Ambients with Wormholes},
  booktitle    = {Eleventh International Conference on Mobile Computing and Ubiquitous
                  Network, {ICMU} 2018, Auckland, New Zealand, October 5-8, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ICMU.2018.8653596},
  doi          = {10.23919/ICMU.2018.8653596},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmu/HansenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00128,
  author       = {Andrei{-}Alexandru Agape and
                  Madalin Claudiu Danceanu and
                  Ren{\'{e}} Rydhof Hansen and
                  Stefan Schmid},
  title        = {Charting the Security Landscape of Programmable Dataplanes},
  journal      = {CoRR},
  volume       = {abs/1807.00128},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00128},
  eprinttype    = {arXiv},
  eprint       = {1807.00128},
  timestamp    = {Wed, 06 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SchoeberlDHKRRS17,
  author       = {Martin Schoeberl and
                  Andreas Engelbredt Dalsgaard and
                  Ren{\'{e}} Rydhof Hansen and
                  Stephan Erbs Korsholm and
                  Anders P. Ravn and
                  Juan Ricardo Rios Rivas and
                  T{\'{o}}rur Biskopst{\o} Str{\o}m and
                  Hans S{\o}ndergaard and
                  Andy J. Wellings and
                  Shuai Zhao},
  title        = {Safety-critical Java for embedded systems},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {22},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3963},
  doi          = {10.1002/CPE.3963},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/SchoeberlDHKRRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HansenJLLP17,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Peter Gj{\o}l Jensen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Danny B{\o}gsted Poulsen},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed
                  Automata},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_5},
  doi          = {10.1007/978-3-319-74860-3\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HansenJLLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Coles-KempH17,
  author       = {Lizzie Coles{-}Kemp and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Theo Tryfonas},
  title        = {Walking the Line: The Everyday Security Ties that Bind},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {464--480},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_32},
  doi          = {10.1007/978-3-319-58460-7\_32},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Coles-KempH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HansenLOW16,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Mads Chr. Olesen and
                  Erik Ramsgaard Wognsen},
  title        = {Formal modelling and analysis of Bitflips in {ARM} assembly code},
  journal      = {Inf. Syst. Frontiers},
  volume       = {18},
  number       = {5},
  pages        = {909--925},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10796-016-9665-7},
  doi          = {10.1007/S10796-016-9665-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/HansenLOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ProbstKH16,
  author       = {Christian W. Probst and
                  Florian Kamm{\"{u}}ller and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Christian W. Probst and
                  Chris Hankin and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Formal Modelling and Analysis of Socio-Technical Systems},
  booktitle    = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson
                  and Flemming Nielson on the Occasion of Their 60th Birthdays},
  series       = {Lecture Notes in Computer Science},
  volume       = {9560},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-27810-0\_3},
  doi          = {10.1007/978-3-319-27810-0\_3},
  timestamp    = {Tue, 21 Mar 2023 20:58:42 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ProbstKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/OlesenHL16,
  author       = {Mads Christian Olesen and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen},
  editor       = {Christian W. Probst and
                  Chris Hankin and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {An Automata-Based Approach to Trace Partitioned Abstract Interpretation},
  booktitle    = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson
                  and Flemming Nielson on the Occasion of Their 60th Birthdays},
  series       = {Lecture Notes in Computer Science},
  volume       = {9560},
  pages        = {88--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-27810-0\_5},
  doi          = {10.1007/978-3-319-27810-0\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/OlesenHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/WognsenHLK16,
  author       = {Erik Ramsgaard Wognsen and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Peter Koch},
  title        = {Energy-aware scheduling of {FIR} filter structures using a timed automata
                  model},
  booktitle    = {2016 {IEEE} 19th International Symposium on Design and Diagnostics
                  of Electronic Circuits {\&} Systems (DDECS), Kosice, Slovakia,
                  April 20-22, 2016},
  pages        = {163--168},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/DDECS.2016.7482468},
  doi          = {10.1109/DDECS.2016.7482468},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ddecs/WognsenHLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/GadyatskayaHLLO16,
  author       = {Olga Gadyatskaya and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Mads Chr. Olesen and
                  Danny B{\o}gsted Poulsen},
  editor       = {Martin Fr{\"{a}}nzle and
                  Nicolas Markey},
  title        = {Modelling Attack-defense Trees Using Timed Automata},
  booktitle    = {Formal Modeling and Analysis of Timed Systems - 14th International
                  Conference, {FORMATS} 2016, Quebec, QC, Canada, August 24-26, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9884},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44878-7\_3},
  doi          = {10.1007/978-3-319-44878-7\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/formats/GadyatskayaHLLO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016nielson,
  editor       = {Christian W. Probst and
                  Chris Hankin and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson
                  and Flemming Nielson on the Occasion of Their 60th Birthdays},
  series       = {Lecture Notes in Computer Science},
  volume       = {9560},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-27810-0},
  doi          = {10.1007/978-3-319-27810-0},
  isbn         = {978-3-319-27809-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/2016nielson.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavidDHLLOP15,
  author       = {Nicolas David and
                  Alexandre David and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Mads Chr. Olesen and
                  Christian W. Probst},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Modelling Social-Technical Attacks with Timed Automata},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808787},
  doi          = {10.1145/2808783.2808787},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DavidDHLLOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Transforming Graphical System Models to Graphical Attack Models},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_6},
  doi          = {10.1007/978-3-319-29968-6\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/WognsenHJHL15,
  author       = {Erik Ramsgaard Wognsen and
                  Boudewijn R. Haverkort and
                  Marijn R. Jongerden and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen},
  editor       = {Sriram Sankaranarayanan and
                  Enrico Vicario},
  title        = {A Score Function for Optimizing the Cycle-Life of Battery-Powered
                  Embedded Systems},
  booktitle    = {Formal Modeling and Analysis of Timed Systems - 13th International
                  Conference, {FORMATS} 2015, Madrid, Spain, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9268},
  pages        = {305--320},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22975-1\_20},
  doi          = {10.1007/978-3-319-22975-1\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/formats/WognsenHJHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HansenLOW15,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen and
                  Mads Chr. Olesen and
                  Erik Ramsgaard Wognsen},
  title        = {Formal Methods for Modelling and Analysis of Single-Event Upsets},
  booktitle    = {2015 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015},
  pages        = {287--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IRI.2015.54},
  doi          = {10.1109/IRI.2015.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/HansenLOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PedersenSLNH15,
  author       = {Martin Leth Pedersen and
                  Michael Hedegaard S{\o}rensen and
                  Daniel Lux and
                  Ulrik Nyman and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {The Timed Decentralised Label Model},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {27--43},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_3},
  doi          = {10.1007/978-3-319-26502-5\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/PedersenSLNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sies/SkelinWOHL15,
  author       = {Mladen Skelin and
                  Erik Ramsgaard Wognsen and
                  Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen},
  title        = {Model checking of finite-state machine-based scenario-aware dataflow
                  using timed automata},
  booktitle    = {10th {IEEE} International Symposium on Industrial Embedded Systems,
                  {SIES} 2015, Siegen, Germany, June 8-10, 2015},
  pages        = {235--244},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SIES.2015.7185065},
  doi          = {10.1109/SIES.2015.7185065},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sies/SkelinWOHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Attack Tree Generation by Policy Invalidation},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_16},
  doi          = {10.1007/978-3-319-24018-3\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/OlesenHLP14,
  author       = {Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen and
                  Julia L. Lawall and
                  Nicolas Palix},
  title        = {Coccinelle: Tool support for automated {CERT} {C} Secure Coding Standard
                  certification},
  journal      = {Sci. Comput. Program.},
  volume       = {91},
  pages        = {141--160},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.scico.2012.10.011},
  doi          = {10.1016/J.SCICO.2012.10.011},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/OlesenHLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/WognsenKOH14,
  author       = {Erik Ramsgaard Wognsen and
                  Henrik S{\o}ndberg Karlsen and
                  Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Formalisation and analysis of Dalvik bytecode},
  journal      = {Sci. Comput. Program.},
  volume       = {92},
  pages        = {25--55},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.scico.2013.11.037},
  doi          = {10.1016/J.SCICO.2013.11.037},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/WognsenKOH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isola/WognsenHL14,
  author       = {Erik Ramsgaard Wognsen and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Battery-Aware Scheduling of Mixed Criticality Systems},
  booktitle    = {Leveraging Applications of Formal Methods, Verification and Validation.
                  Specialized Techniques and Applications - 6th International Symposium,
                  ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8803},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45231-8\_15},
  doi          = {10.1007/978-3-662-45231-8\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isola/WognsenHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtres/SchoeberlDHKRRSS14,
  author       = {Martin Schoeberl and
                  Andreas Engelbredt Dalsgaard and
                  Ren{\'{e}} Rydhof Hansen and
                  Stephan Erbs Korsholm and
                  Anders P. Ravn and
                  Juan Ricardo Rios Rivas and
                  T{\'{o}}rur Biskopst{\o} Str{\o}m and
                  Hans S{\o}ndergaard},
  editor       = {Wolfgang Puffitsch},
  title        = {Certifiable Java for Embedded Systems},
  booktitle    = {Proceedings of the 12th International Workshop on Java Technologies
                  for Real-time and Embedded Systems, {JTRES} 2014, Niagara Falls, NY,
                  USA, October 13-14, 2014},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2661020.2661025},
  doi          = {10.1145/2661020.2661025},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jtres/SchoeberlDHKRRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/ProbstH14,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Adriane Chapman and
                  Bertram Lud{\"{a}}scher and
                  Andreas Schreiber},
  title        = {Model-based Abstraction of Data Provenance},
  booktitle    = {6th Workshop on the Theory and Practice of Provenance, TaPP'14, Cologne,
                  Germany, June 12-13, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/tapp2014/agenda/presentation/probst},
  timestamp    = {Tue, 02 Feb 2021 08:04:56 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/ProbstH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/BogholmFHJLRST13,
  author       = {Thomas B{\o}gholm and
                  Christian Frost and
                  Ren{\'{e}} Rydhof Hansen and
                  Casper Svenning Jensen and
                  Kasper S{\o}e Luckow and
                  Anders P. Ravn and
                  Hans S{\o}ndergaard and
                  Bent Thomsen},
  title        = {Towards harnessing theories through tool support for hard real-time
                  Java programming},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {17--28},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11334-012-0185-4},
  doi          = {10.1007/S11334-012-0185-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/BogholmFHJLRST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/IvanovaPHK13,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  title        = {Externalizing Behaviour for Analysing System Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {52--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.052},
  doi          = {10.22667/JISIS.2013.11.31.052},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ProbstH13,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Reachability-based Impact as a Measure for Insiderness},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {38--48},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.038},
  doi          = {10.22667/JOWUA.2013.12.31.038},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ProbstH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/LawallBPHSM13,
  author       = {Julia L. Lawall and
                  Julien Brunel and
                  Nicolas Palix and
                  Ren{\'{e}} Rydhof Hansen and
                  Henrik Stuart and
                  Gilles Muller},
  title        = {{WYSIWIB:} exploiting fine-grained program structure in a scriptable
                  API-usage protocol-finding process},
  journal      = {Softw. Pract. Exp.},
  volume       = {43},
  number       = {1},
  pages        = {67--92},
  year         = {2013},
  url          = {https://doi.org/10.1002/spe.2102},
  doi          = {10.1002/SPE.2102},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/LawallBPHSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtres/AndersenTDH13,
  author       = {Jeppe L. Andersen and
                  Mikkel Todberg and
                  Andreas Engelbredt Dalsgaard and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Fridtjof Siebert and
                  Kelvin Nilsen},
  title        = {Worst-case memory consumption analysis for {SCJ}},
  booktitle    = {The 11th International Workshop on Java Technologies for Real-time
                  and Embedded Systems, {JTRES} '13, Karlsruhe, Germany, October 9-11,
                  2013},
  pages        = {2--10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2512989.2513000},
  doi          = {10.1145/2512989.2513000},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jtres/AndersenTDH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtres/DalsgaardHS12,
  author       = {Andreas Engelbredt Dalsgaard and
                  Ren{\'{e}} Rydhof Hansen and
                  Martin Schoeberl},
  editor       = {Martin Schoeberl and
                  Andy J. Wellings},
  title        = {Private memory allocation analysis for safety-critical Java},
  booktitle    = {The 10th International Workshop on Java Technologies for Real-time
                  and Embedded Systems, {JTRES} '12, Copenhagen, Denmark, October 24-26,
                  2012},
  pages        = {9--17},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2388936.2388939},
  doi          = {10.1145/2388936.2388939},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jtres/DalsgaardHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JensenPOH12,
  author       = {Torben Jensen and
                  Heine Pedersen and
                  Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {{THAPS:} Automated Vulnerability Scanning of {PHP} Applications},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_3},
  doi          = {10.1007/978-3-642-34210-3\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/JensenPOH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcet/CassezHO12,
  author       = {Franck Cassez and
                  Ren{\'{e}} Rydhof Hansen and
                  Mads Chr. Olesen},
  editor       = {Tullio Vardanega},
  title        = {What is a Timing Anomaly?},
  booktitle    = {12th International Workshop on Worst-Case Execution Time Analysis,
                  {WCET} 2012, July 10, 2012, Pisa, Italy},
  series       = {OASIcs},
  volume       = {23},
  pages        = {1--12},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2012},
  url          = {https://doi.org/10.4230/OASIcs.WCET.2012.1},
  doi          = {10.4230/OASICS.WCET.2012.1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcet/CassezHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/SondergaardTRHB11,
  author       = {Hans S{\o}ndergaard and
                  Bent Thomsen and
                  Anders P. Ravn and
                  Ren{\'{e}} Rydhof Hansen and
                  Thomas B{\o}gholm},
  title        = {Refactoring Real-Time Java Profiles},
  booktitle    = {14th {IEEE} International Symposium on Object/Component/Service-Oriented
                  Real-Time Distributed Computing, {ISORC} 2011, Newport Beach, California,
                  USA, 28-31 March 2011},
  pages        = {109--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISORC.2011.23},
  doi          = {10.1109/ISORC.2011.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isorc/SondergaardTRHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/DalsgaardHJLOOS11,
  author       = {Andreas Engelbredt Dalsgaard and
                  Ren{\'{e}} Rydhof Hansen and
                  Kenneth Yrke J{\o}rgensen and
                  Kim Guldstrand Larsen and
                  Mads Chr. Olesen and
                  Petur Olsen and
                  Jir{\'{\i}} Srba},
  editor       = {Mihaela Gheorghiu Bobaru and
                  Klaus Havelund and
                  Gerard J. Holzmann and
                  Rajeev Joshi},
  title        = {opaal: {A} Lattice Model Checker},
  booktitle    = {{NASA} Formal Methods - Third International Symposium, {NFM} 2011,
                  Pasadena, CA, USA, April 18-20, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6617},
  pages        = {487--493},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20398-5\_37},
  doi          = {10.1007/978-3-642-20398-5\_37},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nfm/DalsgaardHJLOOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssv/BrauerHKLO11,
  author       = {J{\"{o}}rg Brauer and
                  Ren{\'{e}} Rydhof Hansen and
                  Stefan Kowalewski and
                  Kim G. Larsen and
                  Mads Chr. Olesen},
  editor       = {J{\"{o}}rg Brauer and
                  Marco Roveri and
                  Hendrik Tews},
  title        = {Adaptable Value-Set Analysis for Low-Level Code},
  booktitle    = {6th International Workshop on Systems Software Verification, {SSV}
                  2011, August 26, 2011, Nijmegen, The Netherlands},
  series       = {OASIcs},
  volume       = {24},
  pages        = {32--43},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {https://doi.org/10.4230/OASIcs.SSV.2011.32},
  doi          = {10.4230/OASICS.SSV.2011.32},
  timestamp    = {Tue, 15 Feb 2022 09:40:04 +0100},
  biburl       = {https://dblp.org/rec/conf/ssv/BrauerHKLO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/OlesenHLP10,
  author       = {Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen and
                  Julia L. Lawall and
                  Nicolas Palix},
  title        = {Clang and Coccinelle: Synergising program analysis tools for {CERT}
                  {C} Secure Coding Standard certification},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {33},
  year         = {2010},
  url          = {https://doi.org/10.14279/tuj.eceasst.33.455},
  doi          = {10.14279/TUJ.ECEASST.33.455},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/OlesenHLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BolanderH10,
  author       = {Thomas Bolander and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Hybrid logical analyses of the ambient calculus},
  journal      = {Inf. Comput.},
  volume       = {208},
  number       = {5},
  pages        = {433--449},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ic.2009.01.006},
  doi          = {10.1016/J.IC.2009.01.006},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BolanderH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/NicolaGHNNPP10,
  author       = {Rocco De Nicola and
                  Daniele Gorla and
                  Ren{\'{e}} Rydhof Hansen and
                  Flemming Nielson and
                  Hanne Riis Nielson and
                  Christian W. Probst and
                  Rosario Pugliese},
  title        = {From Flow Logic to static type systems for coordination languages},
  journal      = {Sci. Comput. Program.},
  volume       = {75},
  number       = {6},
  pages        = {376--397},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.scico.2009.07.009},
  doi          = {10.1016/J.SCICO.2009.07.009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/NicolaGHNNPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/LawallLHPM10,
  author       = {Julia Lawall and
                  Ben Laurie and
                  Ren{\'{e}} Rydhof Hansen and
                  Nicolas Palix and
                  Gilles Muller},
  title        = {Finding Error Handling Bugs in OpenSSL Using Coccinelle},
  booktitle    = {Eighth European Dependable Computing Conference, {EDCC-8} 2010, Valencia,
                  Spain, 28-30 April 2010},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/EDCC.2010.31},
  doi          = {10.1109/EDCC.2010.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/LawallLHPM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtres/BogholmHRTS10,
  author       = {Thomas B{\o}gholm and
                  Ren{\'{e}} Rydhof Hansen and
                  Anders P. Ravn and
                  Bent Thomsen and
                  Hans S{\o}ndergaard},
  editor       = {Tomas Kalibera and
                  Jan Vitek},
  title        = {Schedulability analysis for Java finalizers},
  booktitle    = {Proceedings of the 8th International Workshop on Java Technologies
                  for Real-Time and Embedded Systems, {JTRES} 2010, Prague, Czech Republic,
                  August 19-21, 2010},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850771.1850772},
  doi          = {10.1145/1850771.1850772},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jtres/BogholmHRTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcet/DalsgaardOTHL10,
  author       = {Andreas Engelbredt Dalsgaard and
                  Mads Chr. Olesen and
                  Martin Toft and
                  Ren{\'{e}} Rydhof Hansen and
                  Kim Guldstrand Larsen},
  editor       = {Bj{\"{o}}rn Lisper},
  title        = {{METAMOC:} Modular Execution Time Analysis using Model Checking},
  booktitle    = {10th International Workshop on Worst-Case Execution Time Analysis,
                  {WCET} 2010, July 6, 2010, Brussels, Belgium},
  series       = {OASIcs},
  volume       = {15},
  pages        = {113--123},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
  year         = {2010},
  url          = {https://doi.org/10.4230/OASIcs.WCET.2010.113},
  doi          = {10.4230/OASICS.WCET.2010.113},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcet/DalsgaardOTHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BogholmHRST10,
  author       = {Thomas B{\o}gholm and
                  Ren{\'{e}} Rydhof Hansen and
                  Anders P. Ravn and
                  Hans S{\o}ndergaard and
                  Bent Thomsen},
  title        = {Formal Modelling and Analysis of Predictable Java},
  journal      = {{ERCIM} News},
  volume       = {2010},
  number       = {81},
  year         = {2010},
  url          = {http://ercim-news.ercim.eu/en81/rd/formal-modelling-and-analysis-of-predictable-java},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BogholmHRST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/LawallHPM10,
  author       = {Julia Lawall and
                  Ren{\'{e}} Rydhof Hansen and
                  Nicolas Palix and
                  Gilles Muller},
  title        = {Improving the Security of Infrastructure Software using Coccinelle},
  journal      = {{ERCIM} News},
  volume       = {2010},
  number       = {83},
  pages        = {54},
  year         = {2010},
  url          = {http://ercim-news.ercim.eu/en83/rd/improving-the-security-of-infrastructure-software-using-coccinelle},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ercim/LawallHPM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LawallBPHSM09,
  author       = {Julia L. Lawall and
                  Julien Brunel and
                  Nicolas Palix and
                  Ren{\'{e}} Rydhof Hansen and
                  Henrik Stuart and
                  Gilles Muller},
  title        = {{WYSIWIB:} {A} declarative approach to finding {API} protocols and
                  bugs in Linux code},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270354},
  doi          = {10.1109/DSN.2009.5270354},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LawallBPHSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtres/BogholmHRTS09,
  author       = {Thomas B{\o}gholm and
                  Ren{\'{e}} Rydhof Hansen and
                  Anders P. Ravn and
                  Bent Thomsen and
                  Hans S{\o}ndergaard},
  editor       = {M. Teresa Higuera{-}Toledano and
                  Martin Schoeberl},
  title        = {A predictable Java profile: rationale and implementations},
  booktitle    = {Proceedings of the 7th International Workshop on Java Technologies
                  for Real-Time and Embedded Systems, {JTRES} 2009, Madrid, Spain, September
                  23-25, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {150--159},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1620405.1620427},
  doi          = {10.1145/1620405.1620427},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jtres/BogholmHRTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ProbstH09,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Fluid information systems},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {125--132},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719048},
  doi          = {10.1145/1719030.1719048},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ProbstH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/BrunelDHLM09,
  author       = {Julien Brunel and
                  Damien Doligez and
                  Ren{\'{e}} Rydhof Hansen and
                  Julia L. Lawall and
                  Gilles Muller},
  editor       = {Zhong Shao and
                  Benjamin C. Pierce},
  title        = {A foundation for flow-based program matching: using temporal logic
                  and model checking},
  booktitle    = {Proceedings of the 36th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2009, Savannah, GA, USA, January
                  21-23, 2009},
  pages        = {114--126},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1480881.1480897},
  doi          = {10.1145/1480881.1480897},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/BrunelDHLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/ProbstH09,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Analysing Access Control Specifications},
  booktitle    = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May
                  21, 2009},
  pages        = {22--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SADFE.2009.13},
  doi          = {10.1109/SADFE.2009.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/ProbstH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ProbstH08,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {An extensible analysable system model},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {235--246},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.012},
  doi          = {10.1016/J.ISTR.2008.10.012},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ProbstH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HansenNNP08,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Flemming Nielson and
                  Hanne Riis Nielson and
                  Christian W. Probst},
  title        = {Static Validation of Licence Conformance Policies},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1104--1111},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.162},
  doi          = {10.1109/ARES.2008.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HansenNNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/NicolaGHNNPP08,
  author       = {Rocco De Nicola and
                  Daniele Gorla and
                  Ren{\'{e}} Rydhof Hansen and
                  Flemming Nielson and
                  Hanne Riis Nielson and
                  Christian W. Probst and
                  Rosario Pugliese},
  editor       = {Doug Lea and
                  Gianluigi Zavattaro},
  title        = {From Flow Logic to Static Type Systems for Coordination Languages},
  booktitle    = {Coordination Models and Languages, 10th International Conference,
                  {COORDINATION} 2008, Oslo, Norway, June 4-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5052},
  pages        = {100--116},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68265-3\_7},
  doi          = {10.1007/978-3-540-68265-3\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/NicolaGHNNPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/PadioleauLHM08,
  author       = {Yoann Padioleau and
                  Julia Lawall and
                  Ren{\'{e}} Rydhof Hansen and
                  Gilles Muller},
  editor       = {Joseph S. Sventek and
                  Steven Hand},
  title        = {Documenting and automating collateral evolutions in linux device drivers},
  booktitle    = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK,
                  April 1-4, 2008},
  pages        = {247--260},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352592.1352618},
  doi          = {10.1145/1352592.1352618},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/PadioleauLHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/JonesH08,
  author       = {Neil D. Jones and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Francesco Logozzo and
                  Doron A. Peled and
                  Lenore D. Zuck},
  title        = {{CTL} as an Intermediate Language},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation, 9th International
                  Conference, {VMCAI} 2008, San Francisco, USA, January 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4905},
  pages        = {4},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78163-9\_2},
  doi          = {10.1007/978-3-540-78163-9\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/JonesH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GordonHH09,
  author       = {Andrew D. Gordon and
                  Hans H{\"{u}}ttel and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Steve Kremer and
                  Prakash Panangaden},
  title        = {Type Inference for Correspondence Types},
  booktitle    = {Proceedings of the 6th Workshop on Security Issues in Concurrency,
                  SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {242},
  number       = {3},
  pages        = {21--36},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.079},
  doi          = {10.1016/J.ENTCS.2009.07.079},
  timestamp    = {Fri, 24 Feb 2023 13:42:44 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GordonHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aplas/JonesH07,
  author       = {Neil D. Jones and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Zhong Shao},
  title        = {The Semantics of "Semantic Patches" in Coccinelle: Program
                  Transformation for the Working Programmer},
  booktitle    = {Programming Languages and Systems, 5th Asian Symposium, {APLAS} 2007,
                  Singapore, November 29-December 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4807},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76637-7\_21},
  doi          = {10.1007/978-3-540-76637-7\_21},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aplas/JonesH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/StuartHLAPM07,
  author       = {Henrik Stuart and
                  Ren{\'{e}} Rydhof Hansen and
                  Julia L. Lawall and
                  Jesper Andersen and
                  Yoann Padioleau and
                  Gilles Muller},
  editor       = {Eric Eide and
                  Marc E. Fiuczynski},
  title        = {Towards easing the diagnosis of bugs in {OS} code},
  booktitle    = {Proceedings of the 4th workshop on Programming languages and operating
                  systems, PLOS@SOSP 2007, Stevenson, Washington, USA, October 18, 2007},
  pages        = {2:1--2:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1376789.1376792},
  doi          = {10.1145/1376789.1376792},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sosp/StuartHLAPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wollic/BolanderH07,
  author       = {Thomas Bolander and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Daniel Leivant and
                  Ruy J. G. B. de Queiroz},
  title        = {Hybrid Logical Analyses of the Ambient Calculus},
  booktitle    = {Logic, Language, Information and Computation, 14th International Workshop,
                  WoLLIC 2007, Rio de Janeiro, Brazil, July 2-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4576},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73445-1\_7},
  doi          = {10.1007/978-3-540-73445-1\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wollic/BolanderH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/MullerPLH06,
  author       = {Gilles Muller and
                  Yoann Padioleau and
                  Julia L. Lawall and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Semantic patches considered helpful},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {40},
  number       = {3},
  pages        = {90--92},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151374.1151392},
  doi          = {10.1145/1151374.1151392},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/MullerPLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HansenPN06,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Christian W. Probst and
                  Flemming Nielson},
  title        = {Sandboxing in myKlaim},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {174--181},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.115},
  doi          = {10.1109/ARES.2006.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HansenPN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/PadioleauHLM06,
  author       = {Yoann Padioleau and
                  Ren{\'{e}} Rydhof Hansen and
                  Julia L. Lawall and
                  Gilles Muller},
  editor       = {Christian W. Probst},
  title        = {Semantic patches for documenting and automating collateral evolutions
                  in Linux device drivers},
  booktitle    = {Proceedings of the 3rd Workshop on Programming Languages and Operating
                  Systems: Linguistic Support for Modern Operating Systems, {PLOS} 2006,
                  San Jose, California, USA, October 22, 2006},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1215995.1216005},
  doi          = {10.1145/1215995.1216005},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/PadioleauHLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ProbstHN06,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Flemming Nielson},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Where Can an Insider Attack?},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_9},
  doi          = {10.1007/978-3-540-75227-1\_9},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ProbstHN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SondergaardPJH06,
  author       = {Dan S{\o}ndergaard and
                  Christian W. Probst and
                  Christian Damsgaard Jensen and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Program Partitioning Using Dynamic Trust Models},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {170--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_12},
  doi          = {10.1007/978-3-540-75227-1\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SondergaardPJH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/TolstrupNH06,
  author       = {Terkel K. Tolstrup and
                  Flemming Nielson and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Locality-Based Security Policies},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_13},
  doi          = {10.1007/978-3-540-75227-1\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/TolstrupNH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HansenS05,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Igor Siveroni},
  editor       = {Fausto Spoto},
  title        = {Towards Verification of Well-Formed Transactions in Java Card Bytecode},
  booktitle    = {Proceedings of the First Workshop on Bytecode Semantics, Verification,
                  Analysis and Transformation, Bytecode@ETAPS 2005, Edinburgh, UK, April
                  9, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {141},
  number       = {1},
  pages        = {145--162},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.02.032},
  doi          = {10.1016/J.ENTCS.2005.02.032},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/HansenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/Hansen04,
  author       = {Ren{\'{e}} Rydhof Hansen},
  editor       = {David A. Schmidt},
  title        = {A Hardest Attacker for Leaking References},
  booktitle    = {Programming Languages and Systems, 13th European Symposium on Programming,
                  {ESOP} 2004, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29
                  - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2986},
  pages        = {310--324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24725-8\_22},
  doi          = {10.1007/978-3-540-24725-8\_22},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/Hansen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/NielsonNSBHPS04,
  author       = {Flemming Nielson and
                  Hanne Riis Nielson and
                  Hongyan Sun and
                  Mikael Buchholtz and
                  Ren{\'{e}} Rydhof Hansen and
                  Henrik Pilegaard and
                  Helmut Seidl},
  editor       = {Kurt Jensen and
                  Andreas Podelski},
  title        = {The Succinct Solver Suite},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  10th International Conference, {TACAS} 2004, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2004,
                  Barcelona, Spain, March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2988},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24730-2\_21},
  doi          = {10.1007/978-3-540-24730-2\_21},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/NielsonNSBHPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/NielsonHN03,
  author       = {Flemming Nielson and
                  Ren{\'{e}} Rydhof Hansen and
                  Hanne Riis Nielson},
  title        = {Abstract interpretation of mobile ambients},
  journal      = {Sci. Comput. Program.},
  volume       = {47},
  number       = {2-3},
  pages        = {145--175},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-6423(02)00131-4},
  doi          = {10.1016/S0167-6423(02)00131-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/NielsonHN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/NielsonNH02,
  author       = {Flemming Nielson and
                  Hanne Riis Nielson and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Validating firewalls using flow logics},
  journal      = {Theor. Comput. Sci.},
  volume       = {283},
  number       = {2},
  pages        = {381--418},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0304-3975(01)00140-2},
  doi          = {10.1016/S0304-3975(01)00140-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/NielsonNH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/NielsonNHJ99,
  author       = {Flemming Nielson and
                  Hanne Riis Nielson and
                  Ren{\'{e}} Rydhof Hansen and
                  Jacob Grydholt Jensen},
  editor       = {Jos C. M. Baeten and
                  Sjouke Mauw},
  title        = {Validating Firewalls in Mobile Ambients},
  booktitle    = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven,
                  The Netherlands, August 24-27, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1664},
  pages        = {463--477},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48320-9\_32},
  doi          = {10.1007/3-540-48320-9\_32},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/NielsonNHJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/HansenJNN99,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Jacob Grydholt Jensen and
                  Flemming Nielson and
                  Hanne Riis Nielson},
  editor       = {Agostino Cortesi and
                  Gilberto Fil{\'{e}}},
  title        = {Abstract Interpretation of Mobile Ambients},
  booktitle    = {Static Analysis, 6th International Symposium, {SAS} '99, Venice, Italy,
                  September 22-24, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1694},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48294-6\_9},
  doi          = {10.1007/3-540-48294-6\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/HansenJNN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics