|
|
Publications in Math-Net.Ru
-
Devirtualization-based Python static analysis
Proceedings of ISP RAS, 37:6(3) (2025), 109–120
-
Source code annotation for static analysis
Proceedings of ISP RAS, 37:6(1) (2025), 135–148
-
Static analysis of Golang source code: a survey
Proceedings of ISP RAS, 37:6(1) (2025), 59–82
-
Detection of dead function calls as source code defects through static analysis
Proceedings of ISP RAS, 37:4(1) (2025), 65–78
-
Detecting memory and resource leaks in the Svace static analyzer
Proceedings of ISP RAS, 37:3 (2025), 291–302
-
Static analysis of Go maps
Proceedings of ISP RAS, 36:3 (2024), 21–34
-
Static analysis for Scala
Proceedings of ISP RAS, 36:3 (2024), 9–20
-
Static analysis based on the unified abstract syntax tree
Proceedings of ISP RAS, 35:6 (2023), 103–120
-
Static analysis for languages with exception handling
Proceedings of ISP RAS, 34:6 (2022), 7–28
-
Kotlin from the perspective of a static analyzer developer
Proceedings of ISP RAS, 33:6 (2021), 67–82
-
Searching for tainted vulnerabilities in static analysis tool Svace
Proceedings of ISP RAS, 33:1 (2021), 7–32
-
Symbolic execution based intra-procedural analysis for search for defects
Proceedings of ISP RAS, 32:6 (2020), 87–100
-
Deadlock detection using static analysis
Proceedings of ISP RAS, 32:5 (2020), 21–34
-
Using unreachable code analysis in static analysis tool for finding defects in source code
Proceedings of ISP RAS, 28:5 (2016), 145–158
-
Statically detecting buffer overflows in C/C++
Proceedings of ISP RAS, 28:4 (2016), 149–168
-
A static analysis tool Svace as a collection of analyzers with various complexity levels
Proceedings of ISP RAS, 27:6 (2015), 111–134
© , 2026