default search action
René Rydhof Hansen
Person information
- affiliation: Aalborg University, Denmark
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c66]Lise Bech Gehlert, Malthe Peter Højen Jørgensen, Christoffer Brejnholm Koch, Tobias Møller, Signe Kirstine Rusbjerg, Tobias Worm Bøgedal, Danny Bøgsted Poulsen, René Rydhof Hansen, Daniel Lux:
Modelling and Analysis of DTLS: Power Consumption and Attacks. FMICS 2024: 136-151 - [c65]Anders Schlichtkrull, René Rydhof Hansen, Flemming Nielson:
Isabelle-verified correctness of Datalog programs for program analysis. SAC 2024: 1731-1734 - 2022
- [c64]Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen:
Understanding the Challenges of Blocking Unnamed Network Traffic. NOMS 2022: 1-5 - [c63]Ian Slesinger, Lizzie Coles-Kemp, Niki Panteli, René Rydhof Hansen:
Designing Through The Stack: The Case for a Participatory Digital Security By Design. NSPW 2022: 45-59 - [c62]Shiraj Arora, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen:
Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals. SPIN 2022: 61-78 - 2021
- [j16]René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Peter Gjøl Jensen, Danny Bøgsted Poulsen:
ADTLang: a programming language approach to attack defense trees. Int. J. Softw. Tools Technol. Transf. 23(1): 89-104 (2021) - [c61]Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson:
Benign Interaction of Security Domains. Protocols, Strands, and Logic 2021: 312-331 - [c60]Andrei-Alexandru Agape, Madalin Claudiu Danceanu, René Rydhof Hansen, Stefan Schmid:
P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes. ICDCN 2021: 16-25 - [c59]Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen:
Gollector: Measuring Domain Name Dark Matter from Different Vantage Points. NordSec 2021: 133-152 - [c58]Bjarke Hilmer Møller, Jacob Gosch Søndergaard, Kristoffer Skagbæk Jensen, Magnus Winkel Pedersen, Tobias Worm Bøgedal, Anton Christensen, Danny Bøgsted Poulsen, Kim Guldstrand Larsen, René Rydhof Hansen, Thomas Rosted Jensen, Heino Juvoll Madsen, Henrik Uhrenfeldt:
Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code. NordSec 2021: 192-211 - [c57]Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen:
Can a TLS Certificate Be Phishy? SECRYPT 2021: 38-49 - 2020
- [c56]Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson:
Adaptive Security Policies. ISoLA (2) 2020: 280-294 - [c55]Thomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen:
Towards Adversarial Phishing Detection. CSET @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c54]Samvid Dharanikot, Michael Toft Jensen, Sebastian Rom Kristensen, Mathias Sass Michno, Yvonne-Anne Pignolet, René Rydhof Hansen, Stefan Schmid:
Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons. Blockchain 2019: 99-106 - [c53]Lars Nielsen, René Rydhof Hansen, Daniel E. Lucani:
A Multi-Threaded Approach to Encoding with Random Linear Network Coding. EW 2019: 1-7 - [c52]Thomas Kobber Panum, Kaspar Hageman, Jens Myrup Pedersen, René Rydhof Hansen:
Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education. ICALT 2019: 236-238 - [c51]Thomas Kobber Panum, René Rydhof Hansen, Jens Myrup Pedersen:
Kraaler: A User-Perspective Web Crawler. TMA 2019: 153-160 - [e2]Aslan Askarov, René Rydhof Hansen, Willard Rafnsson:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings. Lecture Notes in Computer Science 11875, Springer 2019, ISBN 978-3-030-35054-3 [contents] - 2018
- [c50]René Rydhof Hansen, Christian W. Probst:
Modelling and Analysing Overlay Networks by Ambients with Wormholes. ICMU 2018: 1-4 - [i3]Andrei-Alexandru Agape, Madalin Claudiu Danceanu, René Rydhof Hansen, Stefan Schmid:
Charting the Security Landscape of Programmable Dataplanes. CoRR abs/1807.00128 (2018) - 2017
- [j15]Martin Schoeberl, Andreas Engelbredt Dalsgaard, René Rydhof Hansen, Stephan Erbs Korsholm, Anders P. Ravn, Juan Ricardo Rios Rivas, Tórur Biskopstø Strøm, Hans Søndergaard, Andy J. Wellings, Shuai Zhao:
Safety-critical Java for embedded systems. Concurr. Comput. Pract. Exp. 29(22) (2017) - [c49]René Rydhof Hansen, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen:
Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata. GraMSec@CSF 2017: 75-90 - [c48]Lizzie Coles-Kemp, René Rydhof Hansen:
Walking the Line: The Everyday Security Ties that Bind. HCI (22) 2017: 464-480 - 2016
- [j14]René Rydhof Hansen, Kim Guldstrand Larsen, Mads Chr. Olesen, Erik Ramsgaard Wognsen:
Formal modelling and analysis of Bitflips in ARM assembly code. Inf. Syst. Frontiers 18(5): 909-925 (2016) - [c47]Christian W. Probst, Florian Kammüller, René Rydhof Hansen:
Formal Modelling and Analysis of Socio-Technical Systems. Semantics, Logics, and Calculi 2016: 54-73 - [c46]Mads Christian Olesen, René Rydhof Hansen, Kim Guldstrand Larsen:
An Automata-Based Approach to Trace Partitioned Abstract Interpretation. Semantics, Logics, and Calculi 2016: 88-110 - [c45]Erik Ramsgaard Wognsen, René Rydhof Hansen, Kim Guldstrand Larsen, Peter Koch:
Energy-aware scheduling of FIR filter structures using a timed automata model. DDECS 2016: 163-168 - [c44]Olga Gadyatskaya, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Danny Bøgsted Poulsen:
Modelling Attack-defense Trees Using Timed Automata. FORMATS 2016: 35-50 - [e1]Christian W. Probst, Chris Hankin, René Rydhof Hansen:
Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. Lecture Notes in Computer Science 9560, Springer 2016, ISBN 978-3-319-27809-4 [contents] - 2015
- [c43]Nicolas David, Alexandre David, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Christian W. Probst:
Modelling Social-Technical Attacks with Timed Automata. MIST@CCS 2015: 21-28 - [c42]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Transforming Graphical System Models to Graphical Attack Models. GraMSec@CSF 2015: 82-96 - [c41]Erik Ramsgaard Wognsen, Boudewijn R. Haverkort, Marijn R. Jongerden, René Rydhof Hansen, Kim Guldstrand Larsen:
A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems. FORMATS 2015: 305-320 - [c40]René Rydhof Hansen, Kim Guldstrand Larsen, Mads Chr. Olesen, Erik Ramsgaard Wognsen:
Formal Methods for Modelling and Analysis of Single-Event Upsets. IRI 2015: 287-294 - [c39]Martin Leth Pedersen, Michael Hedegaard Sørensen, Daniel Lux, Ulrik Nyman, René Rydhof Hansen:
The Timed Decentralised Label Model. NordSec 2015: 27-43 - [c38]Mladen Skelin, Erik Ramsgaard Wognsen, Mads Chr. Olesen, René Rydhof Hansen, Kim Guldstrand Larsen:
Model checking of finite-state machine-based scenario-aware dataflow using timed automata. SIES 2015: 235-244 - [c37]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Attack Tree Generation by Policy Invalidation. WISTP 2015: 249-259 - 2014
- [j13]Mads Chr. Olesen, René Rydhof Hansen, Julia L. Lawall, Nicolas Palix:
Coccinelle: Tool support for automated CERT C Secure Coding Standard certification. Sci. Comput. Program. 91: 141-160 (2014) - [j12]Erik Ramsgaard Wognsen, Henrik Søndberg Karlsen, Mads Chr. Olesen, René Rydhof Hansen:
Formalisation and analysis of Dalvik bytecode. Sci. Comput. Program. 92: 25-55 (2014) - [c36]Erik Ramsgaard Wognsen, René Rydhof Hansen, Kim Guldstrand Larsen:
Battery-Aware Scheduling of Mixed Criticality Systems. ISoLA (2) 2014: 208-222 - [c35]Martin Schoeberl, Andreas Engelbredt Dalsgaard, René Rydhof Hansen, Stephan Erbs Korsholm, Anders P. Ravn, Juan Ricardo Rios Rivas, Tórur Biskopstø Strøm, Hans Søndergaard:
Certifiable Java for Embedded Systems. JTRES 2014: 10 - [c34]Christian W. Probst, René Rydhof Hansen:
Model-based Abstraction of Data Provenance. TAPP 2014 - 2013
- [j11]Thomas Bøgholm, Christian Frost, René Rydhof Hansen, Casper Svenning Jensen, Kasper Søe Luckow, Anders P. Ravn, Hans Søndergaard, Bent Thomsen:
Towards harnessing theories through tool support for hard real-time Java programming. Innov. Syst. Softw. Eng. 9(1): 17-28 (2013) - [j10]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Externalizing Behaviour for Analysing System Models. J. Internet Serv. Inf. Secur. 3(3/4): 52-62 (2013) - [j9]Christian W. Probst, René Rydhof Hansen:
Reachability-based Impact as a Measure for Insiderness. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 38-48 (2013) - [j8]Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller:
WYSIWIB: exploiting fine-grained program structure in a scriptable API-usage protocol-finding process. Softw. Pract. Exp. 43(1): 67-92 (2013) - [c33]Jeppe L. Andersen, Mikkel Todberg, Andreas Engelbredt Dalsgaard, René Rydhof Hansen:
Worst-case memory consumption analysis for SCJ. JTRES 2013: 2-10 - 2012
- [c32]Andreas Engelbredt Dalsgaard, René Rydhof Hansen, Martin Schoeberl:
Private memory allocation analysis for safety-critical Java. JTRES 2012: 9-17 - [c31]Torben Jensen, Heine Pedersen, Mads Chr. Olesen, René Rydhof Hansen:
THAPS: Automated Vulnerability Scanning of PHP Applications. NordSec 2012: 31-46 - [c30]Franck Cassez, René Rydhof Hansen, Mads Chr. Olesen:
What is a Timing Anomaly?. WCET 2012: 1-12 - 2011
- [c29]Hans Søndergaard, Bent Thomsen, Anders P. Ravn, René Rydhof Hansen, Thomas Bøgholm:
Refactoring Real-Time Java Profiles. ISORC 2011: 109-116 - [c28]Andreas Engelbredt Dalsgaard, René Rydhof Hansen, Kenneth Yrke Jørgensen, Kim Guldstrand Larsen, Mads Chr. Olesen, Petur Olsen, Jirí Srba:
opaal: A Lattice Model Checker. NASA Formal Methods 2011: 487-493 - [c27]Jörg Brauer, René Rydhof Hansen, Stefan Kowalewski, Kim G. Larsen, Mads Chr. Olesen:
Adaptable Value-Set Analysis for Low-Level Code. SSV 2011: 32-43 - 2010
- [j7]Mads Chr. Olesen, René Rydhof Hansen, Julia L. Lawall, Nicolas Palix:
Clang and Coccinelle: Synergising program analysis tools for CERT C Secure Coding Standard certification. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j6]Thomas Bolander, René Rydhof Hansen:
Hybrid logical analyses of the ambient calculus. Inf. Comput. 208(5): 433-449 (2010) - [j5]Rocco De Nicola, Daniele Gorla, René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst, Rosario Pugliese:
From Flow Logic to static type systems for coordination languages. Sci. Comput. Program. 75(6): 376-397 (2010) - [c26]Julia Lawall, Ben Laurie, René Rydhof Hansen, Nicolas Palix, Gilles Muller:
Finding Error Handling Bugs in OpenSSL Using Coccinelle. EDCC 2010: 191-196 - [c25]Thomas Bøgholm, René Rydhof Hansen, Anders P. Ravn, Bent Thomsen, Hans Søndergaard:
Schedulability analysis for Java finalizers. JTRES 2010: 1-7 - [c24]Andreas Engelbredt Dalsgaard, Mads Chr. Olesen, Martin Toft, René Rydhof Hansen, Kim Guldstrand Larsen:
METAMOC: Modular Execution Time Analysis using Model Checking. WCET 2010: 113-123 - [i2]Thomas Bøgholm, René Rydhof Hansen, Anders P. Ravn, Hans Søndergaard, Bent Thomsen:
Formal Modelling and Analysis of Predictable Java. ERCIM News 2010(81) (2010) - [i1]Julia Lawall, René Rydhof Hansen, Nicolas Palix, Gilles Muller:
Improving the Security of Infrastructure Software using Coccinelle. ERCIM News 2010(83): 54 (2010)
2000 – 2009
- 2009
- [c23]Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller:
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. DSN 2009: 43-52 - [c22]Thomas Bøgholm, René Rydhof Hansen, Anders P. Ravn, Bent Thomsen, Hans Søndergaard:
A predictable Java profile: rationale and implementations. JTRES 2009: 150-159 - [c21]Christian W. Probst, René Rydhof Hansen:
Fluid information systems. NSPW 2009: 125-132 - [c20]Julien Brunel, Damien Doligez, René Rydhof Hansen, Julia L. Lawall, Gilles Muller:
A foundation for flow-based program matching: using temporal logic and model checking. POPL 2009: 114-126 - [c19]Christian W. Probst, René Rydhof Hansen:
Analysing Access Control Specifications. SADFE 2009: 22-33 - 2008
- [j4]Christian W. Probst, René Rydhof Hansen:
An extensible analysable system model. Inf. Secur. Tech. Rep. 13(4): 235-246 (2008) - [c18]René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst:
Static Validation of Licence Conformance Policies. ARES 2008: 1104-1111 - [c17]Rocco De Nicola, Daniele Gorla, René Rydhof Hansen, Flemming Nielson, Hanne Riis Nielson, Christian W. Probst, Rosario Pugliese:
From Flow Logic to Static Type Systems for Coordination Languages. COORDINATION 2008: 100-116 - [c16]Yoann Padioleau, Julia Lawall, René Rydhof Hansen, Gilles Muller:
Documenting and automating collateral evolutions in linux device drivers. EuroSys 2008: 247-260 - [c15]Neil D. Jones, René Rydhof Hansen:
CTL as an Intermediate Language. VMCAI 2008: 4 - [c14]Andrew D. Gordon, Hans Hüttel, René Rydhof Hansen:
Type Inference for Correspondence Types. SecCo@CONCUR 2008: 21-36 - 2007
- [c13]Neil D. Jones, René Rydhof Hansen:
The Semantics of "Semantic Patches" in Coccinelle: Program Transformation for the Working Programmer. APLAS 2007: 303-318 - [c12]Henrik Stuart, René Rydhof Hansen, Julia L. Lawall, Jesper Andersen, Yoann Padioleau, Gilles Muller:
Towards easing the diagnosis of bugs in OS code. PLOS@SOSP 2007: 2:1-2:5 - [c11]Thomas Bolander, René Rydhof Hansen:
Hybrid Logical Analyses of the Ambient Calculus. WoLLIC 2007: 83-100 - 2006
- [j3]Gilles Muller, Yoann Padioleau, Julia L. Lawall, René Rydhof Hansen:
Semantic patches considered helpful. ACM SIGOPS Oper. Syst. Rev. 40(3): 90-92 (2006) - [c10]René Rydhof Hansen, Christian W. Probst, Flemming Nielson:
Sandboxing in myKlaim. ARES 2006: 174-181 - [c9]Yoann Padioleau, René Rydhof Hansen, Julia L. Lawall, Gilles Muller:
Semantic patches for documenting and automating collateral evolutions in Linux device drivers. PLOS 2006: 10 - [c8]Christian W. Probst, René Rydhof Hansen, Flemming Nielson:
Where Can an Insider Attack? Formal Aspects in Security and Trust 2006: 127-142 - [c7]Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen:
Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184 - [c6]Terkel K. Tolstrup, Flemming Nielson, René Rydhof Hansen:
Locality-Based Security Policies. Formal Aspects in Security and Trust 2006: 185-201 - 2005
- [c5]René Rydhof Hansen, Igor Siveroni:
Towards Verification of Well-Formed Transactions in Java Card Bytecode. Bytecode@ETAPS 2005: 145-162 - 2004
- [c4]René Rydhof Hansen:
A Hardest Attacker for Leaking References. ESOP 2004: 310-324 - [c3]Flemming Nielson, Hanne Riis Nielson, Hongyan Sun, Mikael Buchholtz, René Rydhof Hansen, Henrik Pilegaard, Helmut Seidl:
The Succinct Solver Suite. TACAS 2004: 251-265 - 2003
- [j2]Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson:
Abstract interpretation of mobile ambients. Sci. Comput. Program. 47(2-3): 145-175 (2003) - 2002
- [j1]Flemming Nielson, Hanne Riis Nielson, René Rydhof Hansen:
Validating firewalls using flow logics. Theor. Comput. Sci. 283(2): 381-418 (2002)
1990 – 1999
- 1999
- [c2]Flemming Nielson, Hanne Riis Nielson, René Rydhof Hansen, Jacob Grydholt Jensen:
Validating Firewalls in Mobile Ambients. CONCUR 1999: 463-477 - [c1]René Rydhof Hansen, Jacob Grydholt Jensen, Flemming Nielson, Hanne Riis Nielson:
Abstract Interpretation of Mobile Ambients. SAS 1999: 134-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint