Documenting and automating collateral evolutions in Linux device drivers Y Padioleau, J Lawall, RR Hansen, G Muller Acm sigops operating systems review 42 (4), 247-260, 2008 | 317 | 2008 |
Metamoc: Modular execution time analysis using model checking AE Dalsgaard, MC Olesen, M Toft, RR Hansen, KG Larsen 10th international workshop on worst-case execution time analysis (WCET 2010), 2010 | 112 | 2010 |
Validating firewalls in mobile ambients F Nielson, HR Nielson, RR Hansen, JG Jensen CONCUR’99 Concurrency Theory: 10th International Conference Eindhoven, The …, 1999 | 104 | 1999 |
A foundation for flow-based program matching: using temporal logic and model checking J Brunel, D Doligez, RR Hansen, JL Lawall, G Muller Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009 | 90 | 2009 |
Abstract interpretation of mobile ambients R Rydhof Hansen, JG Jensen, F Nielson, HR Nielson Static Analysis: 6th International Symposium, SAS’99 Venice, Italy …, 1999 | 90 | 1999 |
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code JL Lawall, J Brunel, N Palix, RR Hansen, H Stuart, G Muller 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 43-52, 2009 | 80 | 2009 |
Where can an insider attack? CW Probst, RR Hansen, F Nielson Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007 | 80 | 2007 |
Validating firewalls using flow logics F Nielson, HR Nielson, RR Hansen Theoretical Computer Science 283 (2), 381-418, 2002 | 69 | 2002 |
Modelling attack-defense trees using timed automata O Gadyatskaya, RR Hansen, KG Larsen, A Legay, MC Olesen, ... Formal Modeling and Analysis of Timed Systems: 14th International Conference …, 2016 | 63 | 2016 |
Finding error handling bugs in openssl using coccinelle J Lawall, B Laurie, RR Hansen, N Palix, G Muller 2010 European Dependable Computing Conference, 191-196, 2010 | 61 | 2010 |
An extensible analysable system model CW Probst, RR Hansen Information security technical report 13 (4), 235-246, 2008 | 61 | 2008 |
Formalisation and analysis of Dalvik bytecode ER Wognsen, HS Karlsen, MC Olesen, RR Hansen Science of Computer Programming 92, 25-55, 2014 | 49 | 2014 |
Transforming graphical system models to graphical attack models MG Ivanova, CW Probst, RR Hansen, F Kammüller Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016 | 46 | 2016 |
Semantic patches for documenting and automating collateral evolutions in Linux device drivers Y Padioleau, RR Hansen, JL Lawall, G Muller Proceedings of the 3rd workshop on Programming languages and operating …, 2006 | 45 | 2006 |
The succinct solver suite F Nielson, HR Nielson, H Sun, M Buchholtz, RR Hansen, H Pilegaard, ... Tools and Algorithms for the Construction and Analysis of Systems: 10th …, 2004 | 43 | 2004 |
Abstract interpretation of mobile ambients F Nielson, RR Hansen, HR Nielson Science of Computer Programming 47 (2-3), 145-175, 2003 | 37 | 2003 |
Attack tree generation by policy invalidation MG Ivanova, CW Probst, RR Hansen, F Kammüller Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 34 | 2015 |
What is a timing anomaly? F Cassez, RR Hansen, MC Olesen 12th International Workshop on Worst-Case Execution Time Analysis (2012), 2012 | 33 | 2012 |
A predictable java profile: rationale and implementations T Bøgholm, RR Hansen, AP Ravn, B Thomsen, H Søndergaard Proceedings of the 7th International Workshop on Java Technologies for Real …, 2009 | 30 | 2009 |
Sandboxing in myKlaim RR Hansen, CW Probst, F Nielson First International Conference on Availability, Reliability and Security …, 2006 | 30 | 2006 |