Results 31 to 40 of about 121 (112)
Memory violation detection method in binary code
In this paper memory violation detection method is considered. This method applied to program binaries, without requiring debug information. It allows to find such memory violations as out-of-bound read or writing in some buffer.
V. V. Kaushan +3 more
doaj +1 more source
В работе рассматривается интегрированная среда ParJava, поддер-живающая разработку и сопровождение программ, параллельных по данным. При разработке и модификации параллельной программы необходимо убедиться не только в ее правильности, но также в ее ...
В.П. Иванников +4 more
doaj
Buffer overrun detection method in binary code
Buffer overflows are one of the most common and dangerous software errors. Exploitation of such errors can lead to an arbitrary code execution and system disclosure. This paper considers a method for detecting memory violations.
V. V. Kaushan
doaj +1 more source
This article describes an attempt to modify and use Avalanche tool for dynamic analysis and testing of programs reading input data from network sockets. The technique of received data substitution is introduced, and it’s Valgrind based implementation is ...
Ildar Isaev +3 more
doaj
Recovery of binary data structures from program traces
In this paper we consider the problem of recovery of binary data formats and describe the format recovery system implemented in ISP RAS. First, we enumerate general approaches to this problem, their advantages and constraints: static, dynamic and ...
A. I. Avetisyan, A. I. Getman
doaj
Next generation intermediate representations for binary code analysis
A lot of binary code analysis tools do not work directly with machine instructions, instead relying on an intermediate representation from the binary code.
M. A. Solovev +5 more
doaj +1 more source
Поздние витреоретинальные осложнения ретинопатии недоношенных: диагностика и тактика лечения
Цель. Провести анализ частоты, клинических проявлений, информативности методов диагностики и результатов лечения поздних витреоретинальных осложнений при благоприятных исходах РН. Материал и методы. Обследовано 655 пациентов (1267 глаз), из них 999 глаз (
doaj +1 more source
Automated exploit generation method for stack buffer overflow vulnerabilities
In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs.
V. A. Padaryan +2 more
doaj +1 more source
Automatic concurrency defect detection for Android applications
This paper describes issues related to automatic detection of concurrency defects using dynamic analysis methods with primary target subject as the Android platform.
V. P. Ivannikov +2 more
doaj
На основании результатов исследований авторов статьи и литературных данных проведен сравнительный анализ постдиагенетических преобразований терригенных комплексов на платформах и в породных бассейнах, образовавшихся в результате тектонических деформаций ...
doaj

