• Selma Lagerløfs Vej 300, 2-2-38

    9220 Aalborg Ø

    Denmark

20072022

Research activity per year

Filter
Article in proceeding

Search results

  • Article in proceeding

    Adaptable Value-Set Analysis for Low-Level Code

    Brauer, J., Hansen, R. R., Kowalewski, S., Larsen, K. G. & Olesen, M. C., Jul 2012, 6th International Workshop on Systems Software Verification (SSV 2011). Schloss Dagstuhl. Leibniz-Zentrum für Informatik, Vol. 24. 12 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Adaptive Security Policies

    Nielson, F., Hansen, R. R. & Nielson, H. R., 2020, Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings. Margaria, T. & Steffen, B. (eds.). Springer, p. 280-294 15 p. (Lecture Notes in Computer Science, Vol. 12477).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    1 Citation (Scopus)
    20 Downloads (Pure)
  • A Foundation for Flow-Based Program Matching Using Temporal Logic and Model Checking

    Brunel, J., Doligez, D., Hansen, R. R., Lawall, J. & Mulle, G., 2009, Proceedings of the ACM Symposium on Principles of Programming Languages (POPL'09). Association for Computing Machinery, p. 114-126 13 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    33 Citations (Scopus)
  • A multi-threaded approach to encoding with random linear network coding

    Nielsen, L., Hansen, R. R. & Lucani, D. E., 1 Jan 2019, European Wireless 2019 Conference, EW 2019. VDE Verlag GMBH, p. 25-31 7 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Analysing Access Control Specifications

    Probst, C. W. & Hansen, R. R., 2009, Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE-2009). IEEE Computer Society Press, Vol. 4. p. 22-33

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    9 Citations (Scopus)
  • A predictable Java profile: rationale and implementations

    Bøgholm, T., Hansen, R. R., Ravn, A. P., Thomsen, B. & Søndergaard, H., 2009, ACM International Conference Proceeding Series: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems. Association for Computing Machinery, p. 150-159

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    22 Citations (Scopus)
  • A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems

    Wognsen, E. R., Haverkort, B., Jongerden, M., Hansen, R. R. & Larsen, K. G., 22 Aug 2015, Formal Modeling and Analysis of Timed Systems: 13th International Conference, FORMATS 2015, Madrid, Spain, September 2-4, 2015, Proceedings. Springer, p. 305-320 (Lecture Notes in Computer Science, Vol. 9268).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    16 Citations (Scopus)
  • Attack Tree Generation by Policy Invalidation

    Ivanova, M. G., Probst, C., Hansen, R. R. & Kammüller, F., 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings. Akram, R. N. & Jajodia, S. (eds.). Springer, p. 249-259 (Lecture Notes in Computer Science; No. 9311).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    17 Citations (Scopus)
  • Battery-Aware Scheduling of Mixed Criticality Systems

    Wognsen, E. R., Hansen, R. R. & Larsen, K. G., 2014, Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications: 6th International Symposium, ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings, Part II. Margaria, T. & Steffen, B. (eds.). Springer Publishing Company, Vol. 8803. p. 208-222 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    13 Citations (Scopus)
  • Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons

    Dharanikot, S., Jensen, M. T., Kristensen, S. R., Michno, M. S., Pignolet, Y. A., Hansen, R. R. & Schmid, S., 2019, 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, p. 99-106

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Can a TLS certificate be phishy?

    Hageman, K., Kidmose, E., Hansen, R. R. & Pedersen, J. M., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SCITEPRESS Digital Library, p. 38-49 12 p. (International Conference on Security and Cryptography - SECRYPT - Proceedings).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    4 Citations (Scopus)
    176 Downloads (Pure)
  • Certifiable Java for Embedded Systems

    Schoeberl, M., Dalsgaard, A. E., Hansen, R. R., Korsholm, S. E., Ravn, A. P., Rivas, J. R. R., Strøm, T. B. & Søndergaard, H., 2014, Proceedings of the 12th International Workshop on Java Technologies for Real-time and Embedded Systems. Association for Computing Machinery, p. 10-19 10 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Designing Through The Stack: The Case for a Participatory Digital Security By Design

    Slesinger, I., Coles-Kemp, L., Panteli, N. & Hansen, R. R., 24 Oct 2022, Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022. Association for Computing Machinery, p. 45-59 15 p. (ACM International Conference Proceeding Series).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Documenting and Automating Collateral Evolutions in Linux Device Drivers

    Padioleau, Y., Lawall, J. L., Hansen, R. R. & Muller, G., 2008, Proceedings of the European Conference on Computer Systems 2008 (EuroSys 2008). Association for Computing Machinery, p. 247-260

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    92 Citations (Scopus)
  • Energy-Aware Scheduling of FIR Filter Structures using a Timed Automata Model

    Wognsen, E. R., Hansen, R. R., Larsen, K. G. & Koch, P., 20 Apr 2016, 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS). IEEE, p. 163-168 6 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    File
    2 Citations (Scopus)
    436 Downloads (Pure)
  • Finding Error Handling Bugs in OpenSSL using Coccinelle

    Lawall, J., Laurie, B., Hansen, R. R., Palix, N. & Muller, G., 2010, Proceedings of The 8th European Dependable Computing Conference (EDCC-2010). IEEE Computer Society Press, p. 191-196

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    36 Citations (Scopus)
  • Fluid Information Systems

    Probst, C. W. & Hansen, R. R., 2009, Proceedings of the New Security Paradigms Workshop (NSPW'09). Association for Computing Machinery, 8 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    4 Citations (Scopus)
  • Formal Methods for Modelling and Analysis of Single-Event Upsets

    Hansen, R. R., Larsen, K. G., Olesen, M. C. & Wognsen, E. R., 2015, IEEE International Conference on Information Reuse and Integration (IRI 2015). IEEE, p. 287-294

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    3 Citations (Scopus)
  • From Flow Logic to Static Type Systems for Coordination Languages

    De Nicola, R., Gorla, D., Hansen, R. R., Nielson, F., Nielson, H. R., Probst, C. W. & Pugliese, R., 2008, Proceedings of the 10th International Conference on Coordination Models and Languages (Coordination'08). Springer, p. 100-116 (Lecture Notes in Computer Science; No. 5052).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    5 Citations (Scopus)
  • Gollector: Measuring Domain Name Dark Matter from Different Vantage Points

    Hageman, K., Hansen, R. R. & Pedersen, J. M., 2021, Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings. Tuveri, N., Michalas, A. & Brumley, B. B. (eds.). Springer, p. 133-152 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13115 LNCS).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education

    Panum, T. K., Hageman, K. D., Pedersen, J. M. & Hansen, R. R., 2 Sept 2019, 2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT). Chang, M., Sampson, D. G., Huang, R., Gomes, A. S., Chen, N-S., Bittencourt, I. I., Kinshuk, K., Dermeval, D. & Bittencourt, I. M. (eds.). IEEE, p. 236-238 3 p. 8820918. (International Conference on Advanced Learning Technologies (ICALT)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    9 Citations (Scopus)
  • Kraaler: A User-Perspective Web Crawler

    Panum, T. K., Hansen, R. R. & Pedersen, J. M., 5 Aug 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA). Secci, S., Chrisment, I., Fiore, M., Tabourier, L. & Lim, K-W. (eds.). IEEE, p. 153-160 8 p. 8784660

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    4 Citations (Scopus)
  • Latency performance of encoding with random linear network coding

    Nielsen, L., Hansen, R. R. & Lucani, D. E., 1 Jan 2018, European Wireless 2018 : 24th European Wireless Conference . VDE Verlag GMBH, p. 120-124 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • METAMOC; Modular Execution Time Analysis using Model Checking

    Dalsgaard, A. E., Olesen, M. C., Toft, M., Hansen, R. R. & Larsen, K. G., 2010, Proceedings of the 10th International Workshop on Worst-Case Execution-Time Analysis (WCET2010).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    48 Citations (Scopus)
  • Model checking of finite-state machine-based scenario-aware dataflow using timed automata

    Skelin, M., Wognsen, E. R., Olesen, M. C., Hansen, R. R. & Larsen, K. G., 10 Aug 2015, 2015 10th IEEE International Symposium on Industrial Embedded Systems, SIES 2015 - Proceedings. IEEE, p. 235-244 10 p. 7185065

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    11 Citations (Scopus)
  • Modelling and Analysing Overlay Networks by Ambients with Wormholes

    Hansen, R. R. & Probst, C. W., 2018, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018. IEEE Signal Processing Society, 8653596. (2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    3 Citations (Scopus)
  • Modelling Attack-defense Trees Using Timed Automata

    Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Poulsen, D. B., 2016, Formal Modeling and Analysis of Timed Systems. Springer, p. 35-50 (Lecture Notes in Computer Science, Vol. 9884).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    42 Citations (Scopus)
  • Modelling Socio-Technical Attacks with Timed Automata

    David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, p. 21-28 7 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    14 Citations (Scopus)
  • P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes

    Agape, A. A., Danceanu, M. C., Hansen, R. R. & Schmid, S., 5 Jan 2021, ICDCN 2021 - Proceedings of the 2021 International Conference on Distributed Computing and Networking. Association for Computing Machinery, p. 16-25 10 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    4 Citations (Scopus)
  • Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code

    Møller, B. H., Søndergaard, J. G., Jensen, K. S., Pedersen, M. W., Bøgedal, T. W., Christensen, A., Poulsen, D. B., Larsen, K. G., Hansen, R. R., Rosted Jensen, T., Juvoll Madsen, H. & Uhrenfeldt, H., 10 Dec 2021, Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings. Tuveri, N., Michalas, A. & Brumley, B. B. (eds.). Springer, p. 192-211 20 p. (Lecture Notes in Computer Science, Vol. LNCS 13115).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Private memory allocation analysis for safety-critical java

    Dalsgaard, A. E., Hansen, R. R. & Schoeberl, M., 2012, JTRES '12 Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems. Association for Computing Machinery, p. 9-17 9 p. (Proceedings of the International Workshop of Java Technologies for Real-Time and Embedded Systems).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    7 Citations (Scopus)
  • Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata

    Hansen, R. R., Jensen, P. G., Larsen, K. G., Legay, A. & Poulsen, D. B., 2017, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Springer, p. 75-90 (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    7 Citations (Scopus)
  • Refactoring Real-Time Java Profiles

    Søndergaard, H., Thomsen, B., Ravn, A. P., Hansen, R. R. & Bøgholm, T., 28 Mar 2011, Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2011 14th IEEE International Symposium on. IEEE, p. 109 - 116 16 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    4 Citations (Scopus)
  • Schedulability Analysis for Java Finalizers

    Bøgholm, T., Hansen, R. R., Søndergaard, H., Ravn, A. P. & Thomsen, B., 2010, Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems: ACM International Conference Proceeding Series. Association for Computing Machinery, 7 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    2 Citations (Scopus)
  • Static validation of licence conformance policies

    Hansen, R. R., Nielson, F., Nielson, H. R. & Probst, C. W., 2008, ARES 2008: Proceedings of the Third International Conference on Availability, Security and Reliability. IEEE Computer Society Press, p. 1104-1111

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    9 Citations (Scopus)
  • Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals

    Arora, S., Hansen, R. R., Larsen, K. G., Legay, A. & Poulsen, D. B., 23 Aug 2022, Model Checking Software, SPIN 2022: 28th International Symposium, SPIN 2022, Proceedings. Legunsen, O. & Rosu, G. (eds.). Springer, p. 61-78 18 p. (Lecture Notes in Computer Science, Vol. 13255).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • THAPS: Automated Vulnerability Scanning of PHP Applications

    Jensen, T., Pedersen, H., Olesen, M. C. & Hansen, R. R., 2012, Proceedings of the 17th Nordic Conference on Secure IT-Systems (NordSec 2012). Springer, Vol. 7617. p. 31-46 (Lecture Notes in Computer Science, Vol. 7617).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    15 Citations (Scopus)
  • The Semantics of "Semantic Patches" in Coccinelle: Program Transformation for the Working Programmer

    Jones, N. D. & Hansen, R. R., 2007, Programming Languages and Systems: 5th Asian Symposium, APLAS 2007. Shao, Z. (ed.). Springer, p. 303-318 (Lecture Notes in Computer Science; No. 4807).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    2 Citations (Scopus)
  • The Timed Decentralised Label Model

    Pedersen, M. L., Sørensen, M. H., Lux, D., Nyman, U. M. & Hansen, R. R., 2015, Secure IT Systems: 20th Nordic Conference on Secure IT-Systems (NordSec 2015). Buchegger, S. & Dam, M. (eds.). Springer, p. 27-43 (Lecture Notes in Computer Science; No. 9417).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    2 Citations (Scopus)
    458 Downloads (Pure)
  • Towards Adversarial Phishing Detection

    Panum, T. K., Hageman, K., Hansen, R. R. & Pedersen, J. M., Aug 2020, 13th USENIX Workshop on Cyber Security Experimentation and Test. USENIX - The Advanced Computing Systems Association, 10 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    6 Citations (Scopus)
    51 Downloads (Pure)
  • Transforming graphical system models to graphical attack models

    Ivanova, M. G., Probst, C. W., Hansen, R. R. & Kammüller, F., 2016, Graphical Models for Security: GraMSec 2015. Springer, p. 82-96 15 p. (Lecture Notes in Computer Science, Vol. 9390).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    23 Citations (Scopus)
  • Type inference for correspondence types

    Hüttel, H., Gordon, A. & Hansen, R. R., 2009, Proceedings of the 6th Workshop on Security Issues in Concurrency (SecCo'08). Elsevier, p. 21-36 15 p. (Electronic Notes in Theoretical Computer Science; No. 242, Vol. 3).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Understanding the Challenges of Blocking Unnamed Network Traffic.

    Hageman, K., Kidmose, E., Hansen, R. R. & Pedersen, J. M., 2022, NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022. Varga, P., Granville, L. Z., Galis, A., Godor, I., Limam, N., Chemouil, P., Francois, J. & Pahl, M-O. (eds.). IEEE, p. 1-5 9789854. (IEEE/IFIP Network Operations and Management Symposium).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • Walking the line: The everyday security ties that bind

    Coles-Kemp, L. & Hansen, R. R., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer, Vol. 10292 LNCS. p. 464-480 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10292 LNCS).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    13 Citations (Scopus)
  • What is a Timing Anomaly?

    Cassez, F., Hansen, R. R. & Olesen, M. C., 2012, Proceedings of the 12th International Workshop on Worst-Case Execution-Time Analysis. Vardanega, T. (ed.). Dagstuhl, Germany: Schloss Dagstuhl. Leibniz-Zentrum für Informatik, Vol. 23. p. 1-12 12 p. (OpenAccess Series in Informatics).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    10 Citations (Scopus)
    169 Downloads (Pure)
  • Where can an insider attack?

    Probst, C. W., Hansen, R. R. & Nielson, F., 2007, Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Revised Selected Papers. Springer, p. 127-142 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 4691 LNCS).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    34 Citations (Scopus)
  • Worst-Case Memory Consumption Analysis for SCJ

    Andersen, J. L., Todberg, M., Dalsgaard, A. E. & Hansen, R. R., 2013, Proceedings of the 11th International Workshop on Java Technologies for Real-time and Embedded Systems . Association for Computing Machinery, p. 2-10 9 p. (Proceedings of the International Workshop of Java Technologies for Real-Time and Embedded Systems).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    7 Citations (Scopus)
  • WYSIWYB: A Declarative Approach to Finding API Protocols and Bugs in Linux Code

    Lawall, J., Lawall, J., Palix, N., Hansen, R. R. & Muller, G., 2009, Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09). IEEE Computer Society Press, p. 43-52 10 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review