Results 31 to 40 of about 149 (134)
Программная среда для динамического анализа бинарного кода
В данной работе рассматривается среда TrEx, позволяющая выполнять динамический анализ защищенного бинарного кода. Преследуемой целью является получение описания интересующего алгоритма.
В.А. Падарян +2 more
doaj
Building security predicates for some types of vulnerabilities
Approaches for code execution using program vulnerabilities are considered in this paper. Particularly, ways of code execution using buffer overflow on stack and on heap, using use-after-free vulnerabilities and format string vulnerabilities are examined
A. N. Fedotov +3 more
doaj +1 more source
Using ABI for virtual machines introspection
The paper proposes an approach to introspection of virtual machines using the applications binary interface. The purpose of the method is to get information about the system, while having a minimum knowledge about its internal structure.
N. I. Fursova +2 more
doaj +1 more source
Методика определения классов уязвимостей мобильных приложений
Мобильные устройства и приложения играют ключевую роль в повседневной жизни современного человека, предоставляя доступ к разнообразным информационным ресурсам и онлайн-сервисам.
Э. А. Карпунина +1 more
doaj +1 more source
Raising the level of abstraction of program execution trace
This paper presents a method for raising the level of abstraction of a program execution trace by building of an algorithm model.Dynamic analysis of executable files is often used to understand the logic of a program in the absence of source code. One of
A. G. Nazarov +3 more
doaj +1 more source
ПРОБЛЕМЫ ЗАНЯТОСТИ, БЕЗРАБОТИЦЫ И РАЗВИТИЯ РЫНКА ТРУДА В КЫРГЫЗСКОЙ РЕСПУБЛИКЕ
Рынок труда Кыргызской Республики в настоящее время характеризуется нестабильностью и избытком неквалифицированной рабочей силы в регионах, высоким уровнем безработицы и нехваткой квалифицированной рабочей силы.
Саламат Ураимовна Астанова +1 more
doaj +1 more source
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin +5 more
doaj +1 more source
Dynamic Java program analysis using virtual machine modification
This article focuses on practical questions of performing program analysis for applications executed using interpreters and virtual machines. Using Dalvik virtual machine in Android operating system as target interpreter layer, we showcase the ...
M. . Ermakov, S. . Vartanov
doaj +1 more source
Data race occurs in multithreaded program when several threads simultaneously access same shared data and at least of them writes. Two main approaches to automatic race detection - static and dynamic - have their pros and cons.
V. Yu. Trifanov
doaj +1 more source
This article describes an attempt to modify and use Avalanche tool for dynamic analysis and testing of programs reading input data from network sockets. The technique of received data substitution is introduced, and it’s Valgrind based implementation is ...
Ildar Isaev +3 more
doaj

