RUS  ENG
Full version
PEOPLE

Khoroshilov Alexey Vladimirovich

Publications in Math-Net.Ru

  1. Methods of runtime verification of industrial information security tools based on formal access control models.

    Proceedings of ISP RAS, 37:3 (2025),  277–290
  2. Solving the multilingualism problem in the international scientific and technical information space

    Proceedings of ISP RAS, 35:6 (2023),  337–346
  3. Elicitation of functional requirements from the application programming interface documentation for functional testing

    Proceedings of ISP RAS, 34:1 (2022),  7–22
  4. Runtime verification of operating systems based on abstract models

    Proceedings of ISP RAS, 33:6 (2021),  15–26
  5. Building a methodology for secure system software development on the example of operating systems

    Proceedings of ISP RAS, 33:5 (2021),  25–40
  6. Verification of compliance for multilevel models in individual trace semantics

    Proceedings of ISP RAS, 32:6 (2020),  19–30
  7. Monitoring and testing based on multi-level program specifications

    Proceedings of ISP RAS, 32:6 (2020),  7–18
  8. Architecture of a machine code deductive verification system

    Proceedings of ISP RAS, 32:3 (2020),  7–19
  9. Rendering system for the aircraft real-time OS JetOS

    Proceedings of ISP RAS, 32:1 (2020),  57–70
  10. Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system

    Proceedings of ISP RAS, 32:1 (2020),  7–26
  11. Requirements management for safety-critical systems. Overview of solutions

    Proceedings of ISP RAS, 31:1 (2019),  25–48
  12. Component-based verification of operating systems

    Proceedings of ISP RAS, 30:6 (2018),  367–382
  13. On representation of simulation time in functional programming style

    Proceedings of ISP RAS, 30:6 (2018),  341–366
  14. Formalizing metamodel of requirements management system

    Proceedings of ISP RAS, 30:5 (2018),  163–176
  15. Building modular real-time software from unified component model

    Proceedings of ISP RAS, 30:3 (2018),  135–148
  16. In-kernel memory-mapped I/O device emulation

    Proceedings of ISP RAS, 30:3 (2018),  121–134
  17. Using modularization in embedded OS

    Proceedings of ISP RAS, 29:4 (2017),  283–294
  18. ADV_SPM — Formal security policy models in practice

    Proceedings of ISP RAS, 29:3 (2017),  43–56
  19. Adjustable method with predicate abstraction for detection of race conditions in operating systems

    Proceedings of ISP RAS, 28:6 (2016),  65–86
  20. Design and architecture of real-time operating system

    Proceedings of ISP RAS, 28:2 (2016),  181–192
  21. Integration points of operating system verification techniques

    Proceedings of ISP RAS, 27:5 (2015),  175–190
  22. Using fault injection for testing Linux kernel components

    Proceedings of ISP RAS, 27:5 (2015),  157–174
  23. Python-based constraint language for architecture models

    Proceedings of ISP RAS, 27:5 (2015),  143–156
  24. Lightweight static analysis for data race detection in operating system kernels

    Proceedings of ISP RAS, 27:5 (2015),  87–116
  25. Towards deductive verification of C programs with shared data

    Proceedings of ISP RAS, 27:4 (2015),  49–68


© Steklov Math. Inst. of RAS, 2026