|
Dynamic detection of use after free bugs S. A. Asryan, S. S. Gaysaryan, Sh. F. Kurmangaleev, A. M. Aghabalyan, N. H. Hovsepyan, S. S. Sargsyan
|
7 |
|
Buffer overflow detection via static analysis: expectations vs. reality I. A. Dudina
|
21 |
|
Extracting architectural information from source code of ARINC 653-compatible application software using CEGAR-based approach S. L. Lesovoy
|
31 |
|
Applying synchronization contracts approach for dynamic detection of data races in industrial applications V. Yu. Trifanov
|
47 |
|
Applying deep learning to C# call sequence synthesis A. E. Chebykin, I. A. Kirilenko
|
63 |
|
Stealth debugging of programs in Qemu emulator with WinDbg debugger M. A. Abakumov, P. M. Dovgalyuk
|
87 |
|
Configurable system call tracer in QEMU emulator A. V. Ivanov, P. M. Dovgaluk, V. A. Makarov
|
93 |
|
Analysis of methods for assessing the reliability of equipment and systems. Practice of methods N. V. Pakulin, E. M. Lavrischeva, A. G. Ryzhov, S. V. Zelenov
|
99 |
|
In-kernel memory-mapped I/O device emulation V. Yu. Cheptsov, A. V. Khoroshilov
|
121 |
|
Building modular real-time software from unified component model K. A. Mallachiev, A. V. Khoroshilov
|
135 |
|
Methods of protecting decentralized autonomous organizations from crashes and attacks A. A. Andryukhin
|
149 |
|
Cryptographic stack machine notation one S. E. Prokopev
|
165 |
|
Construction of validation modules based on reference functional models in a standalone verification of communication subsystem D. A. Lebedev, I. A. Stotland
|
183 |
|
Verification of system on chip integrated communication controllers M. V. Petrochenkov, R. E. Mushtakov, D. I. Shpagilev
|
195 |
|
Dynamically changing user interfaces: software solutions based on automatically collected user information V. V. Zosimov, O. V. Khrystodorov, O. S. Bulgakova
|
207 |
|
Variants of chinese postman problems and a way of solving through transformation into vehicle routing problems M. K. Gordenko, S. M. Avdoshin
|
221 |
|
Analysis of mathematical formulations of capacitated vehicle routing problem and methods for their solution E. Beresneva, S. Avdoshin
|
233 |
|
Applying the methods of system analysis to teaching assistants’ evaluation E. Beresneva, M. Gordenko
|
251 |
|
Static dependency analysis for semantic data validation D. V. Ilyin, N. Yu. Fokina, V. A. Semenov
|
271 |
|
Simulating behavior of multi-agent systems with acyclic interactions of agents R. A. Nesterov, A. A. Mitsyuk, I. A. Lomazova
|
285 |
|
On the model checking of finite state transducers over semigroups A. R. Gnatenko, V. A. Zakharov
|
303 |
|
On the verification of strictly deterministic behavior of timed finite state machines E. M. Vinarskii, V. A. Zakharov
|
325 |
|
Toward construction of a modular model of distributed intelligence Yu. L. Slovokhotov, I. S. Neretin
|
341 |