René Rydhof Hansen

Orcid: 0000-0002-5688-6432

Affiliations:
  • Aalborg University, Denmark


According to our database1, René Rydhof Hansen authored at least 81 papers between 1999 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals.
Proceedings of the Model Checking Software - 28th International Symposium, 2022

Designing Through The Stack: The Case for a Participatory Digital Security By Design.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Understanding the Challenges of Blocking Unnamed Network Traffic.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
ADTLang: a programming language approach to attack defense trees.
Int. J. Softw. Tools Technol. Transf., 2021

Can a TLS Certificate Be Phishy?
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Gollector: Measuring Domain Name Dark Matter from Different Vantage Points.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

Benign Interaction of Security Domains.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Towards Adversarial Phishing Detection.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Adaptive Security Policies.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020

2019
Kraaler: A User-Perspective Web Crawler.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education.
Proceedings of the 19th IEEE International Conference on Advanced Learning Technologies, 2019

A Multi-Threaded Approach to Encoding with Random Linear Network Coding.
Proceedings of the 25th European Wireless Conference, 2019

Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Charting the Security Landscape of Programmable Dataplanes.
CoRR, 2018

Modelling and Analysing Overlay Networks by Ambients with Wormholes.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

2017
Safety-critical Java for embedded systems.
Concurr. Comput. Pract. Exp., 2017

Walking the Line: The Everyday Security Ties that Bind.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

2016
Formal modelling and analysis of Bitflips in ARM assembly code.
Inf. Syst. Frontiers, 2016

Modelling Attack-defense Trees Using Timed Automata.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2016

Energy-aware scheduling of FIR filter structures using a timed automata model.
Proceedings of the 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), 2016

Formal Modelling and Analysis of Socio-Technical Systems.
Proceedings of the Semantics, Logics, and Calculi, 2016

An Automata-Based Approach to Trace Partitioned Abstract Interpretation.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Attack Tree Generation by Policy Invalidation.
Proceedings of the Information Security Theory and Practice, 2015

Model checking of finite-state machine-based scenario-aware dataflow using timed automata.
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015

The Timed Decentralised Label Model.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Formal Methods for Modelling and Analysis of Single-Event Upsets.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2015

Transforming Graphical System Models to Graphical Attack Models.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

Modelling Social-Technical Attacks with Timed Automata.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Formalisation and analysis of Dalvik bytecode.
Sci. Comput. Program., 2014

Coccinelle: Tool support for automated CERT C Secure Coding Standard certification.
Sci. Comput. Program., 2014

Model-based Abstraction of Data Provenance.
Proceedings of the 6th Workshop on the Theory and Practice of Provenance, 2014

Certifiable Java for Embedded Systems.
Proceedings of the 12th International Workshop on Java Technologies for Real-time and Embedded Systems, 2014

Battery-Aware Scheduling of Mixed Criticality Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

2013
WYSIWIB: exploiting fine-grained program structure in a scriptable API-usage protocol-finding process.
Softw. Pract. Exp., 2013

Reachability-based Impact as a Measure for Insiderness.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Externalizing Behaviour for Analysing System Models.
J. Internet Serv. Inf. Secur., 2013

Towards harnessing theories through tool support for hard real-time Java programming.
Innov. Syst. Softw. Eng., 2013

Worst-case memory consumption analysis for SCJ.
Proceedings of the 11th International Workshop on Java Technologies for Real-time and Embedded Systems, 2013

2012
What is a Timing Anomaly?.
Proceedings of the 12th International Workshop on Worst-Case Execution Time Analysis, 2012

THAPS: Automated Vulnerability Scanning of PHP Applications.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Private memory allocation analysis for safety-critical Java.
Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems, 2012

2011
Adaptable Value-Set Analysis for Low-Level Code.
Proceedings of the 6th International Workshop on Systems Software Verification, 2011


Refactoring Real-Time Java Profiles.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2011

2010
From Flow Logic to static type systems for coordination languages.
Sci. Comput. Program., 2010

Hybrid logical analyses of the ambient calculus.
Inf. Comput., 2010

Improving the Security of Infrastructure Software using Coccinelle.
ERCIM News, 2010

Formal Modelling and Analysis of Predictable Java.
ERCIM News, 2010

Clang and Coccinelle: Synergising program analysis tools for CERT C Secure Coding Standard certification.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

METAMOC: Modular Execution Time Analysis using Model Checking.
Proceedings of the 10th International Workshop on Worst-Case Execution Time Analysis, 2010

Schedulability analysis for Java finalizers.
Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems, 2010

Finding Error Handling Bugs in OpenSSL Using Coccinelle.
Proceedings of the Eighth European Dependable Computing Conference, 2010

2009
Analysing Access Control Specifications.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

A foundation for flow-based program matching: using temporal logic and model checking.
Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2009

Fluid information systems.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

A predictable Java profile: rationale and implementations.
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, 2009

WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
An extensible analysable system model.
Inf. Secur. Tech. Rep., 2008

Type Inference for Correspondence Types.
Proceedings of the 6th Workshop on Security Issues in Concurrency, 2008

CTL as an Intermediate Language.
Proceedings of the Verification, 2008

Documenting and automating collateral evolutions in linux device drivers.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

Static Validation of Licence Conformance Policies.
Proceedings of the The Third International Conference on Availability, 2008

2007
Towards easing the diagnosis of bugs in OS code.
Proceedings of the 4th workshop on Programming languages and operating systems, 2007

The Semantics of "Semantic Patches" in Coccinelle: Program Transformation for the Working Programmer.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
Semantic patches considered helpful.
ACM SIGOPS Oper. Syst. Rev., 2006

Locality-Based Security Policies.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Program Partitioning Using Dynamic Trust Models.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Where Can an Insider Attack?
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Semantic patches for documenting and automating collateral evolutions in Linux device drivers.
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006

Sandboxing in myKlaim.
Proceedings of the The First International Conference on Availability, 2006

2005
Towards Verification of Well-Formed Transactions in Java Card Bytecode.
Proceedings of the First Workshop on Bytecode Semantics, 2005

2004
The Succinct Solver Suite.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

A Hardest Attacker for Leaking References.
Proceedings of the Programming Languages and Systems, 2004

2003
Abstract interpretation of mobile ambients.
Sci. Comput. Program., 2003

2002
Validating firewalls using flow logics.
Theor. Comput. Sci., 2002

1999
Abstract Interpretation of Mobile Ambients.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Validating Firewalls in Mobile Ambients.
Proceedings of the CONCUR '99: Concurrency Theory, 1999


  Loading...