Publications in Math-Net.Ru
-
Building security predicates for some types of vulnerabilities
Proceedings of ISP RAS, 29:6 (2017), 151–162
-
Buffer overrun detection method in binary code
Proceedings of ISP RAS, 28:5 (2016), 135–144
-
Software defect severity estimation in presence of modern defense mechanisms
Proceedings of ISP RAS, 28:5 (2016), 73–92
-
Search method for format string vulnerabilities
Proceedings of ISP RAS, 27:4 (2015), 23–38
-
Memory violation detection method in binary code
Proceedings of ISP RAS, 27:2 (2015), 105–126
© , 2026