Zobrazeno 1 - 10
of 181
pro vyhledávání: '"статический анализ"'
Publikováno v:
Труды Института системного программирования РАН, Vol 31, Iss 3, Pp 177-190 (2019)
Due to huge amounts of code in modern software products, there is always a variety of subtle errors or flaws in programs, which are hard to discover during everyday use or through conventional testing. A lot of such errors could be used as a potenti
Externí odkaz:
https://doaj.org/article/4d6b192a7eb04549b59350f0f35223da
Publikováno v:
Труды Института системного программирования РАН, Vol 31, Iss 3, Pp 135-144 (2019)
Data access conflicts may arise in hardware designs. One of the ways of detecting such conflicts is static analysis of hardware descriptions in HDL. We propose a static analysis-based approach to data conflicts extraction from HDL descriptions. This
Externí odkaz:
https://doaj.org/article/3d0ddb77f1c34f1ea6abc700fbd9406f
Autor:
Mariam Seropovna Arutunian, Gregory Sergeevitch Ivanov, Vahagn Gevorgovitch Vardanyan, Hayk Karenovitch Aslanyan, Arutyun Ishkhanovitch Avetisyan, Shamil Faimovitch Kurmangaleev
Publikováno v:
Труды Института системного программирования РАН, Vol 31, Iss 1, Pp 49-58 (2019)
Software developers often resort to borrowing code both within one project and from another. Due to the possible content of errors in the source code snippet, this can lead to error propagation across program. Libraries used without source code may a
Externí odkaz:
https://doaj.org/article/6e79eef22567404182a9cb5abd31546c
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 6, Pp 367-382 (2019)
The paper presents recent results on the way towards accurate and complete verification of industrial operating systems (OS). We consider here OSes, either of general purpose or actively used in some industrial domain, elaborated and maintained for a
Externí odkaz:
https://doaj.org/article/1177b6bf0df1485baad0e075d25e9911
Autor:
M. A. Solovev, M. G. Bakulin, M. S. Gorbachev, D. V. Manushin, V. A. Padaryan, S. S. Panasenko
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 6, Pp 39-68 (2019)
A lot of binary code analysis tools do not work directly with machine instructions, instead relying on an intermediate representation from the binary code. In this paper, we first analyze problems in binary code analysis that benefit from such an IR
Externí odkaz:
https://doaj.org/article/262e8f7b72194830bb81c96c7baaab78
Autor:
A. Yu. Gerasimov, S. S. Sargsyan, S. F. Kurmangaleev, J. A. Hakobyan, S. A. Asryan, M. K. Ermakov
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 6, Pp 25-38 (2019)
This paper describes a new approach for dynamic code analysis. It combines dynamic symbolic execution and static code analysis with fuzzing to increase efficiency of each component. During fuzzing we recover indirect function calls and pass that info
Externí odkaz:
https://doaj.org/article/3dc6d4c08abe49029eaaa97f25e6f8e5
Autor:
I. A. Dudina, N. E. Malyshev
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 5, Pp 55-74 (2018)
Many buffer overrun errors in C programs are caused by erroneous string manipulations. These can lead to denial of service, incorrect computations or even exploitable vulnerabilities. One approach to eliminate such defects in the course of program de
Externí odkaz:
https://doaj.org/article/a9866d83895f40ce985ff5d93e98a01d
Autor:
H. K. Aslanyan
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 5, Pp 89-100 (2018)
This paper describes the developed platform for static analysis of binary code. The platform is developed based on interprocedural, flow-sensitive and context-sensitive analysis of the program. The machine-independent language REIL is used as an inte
Externí odkaz:
https://doaj.org/article/c5b221ea75f34e5a8e744d72d57bc62c
Publikováno v:
Труды Института системного программирования РАН, Vol 29, Iss 5, Pp 111-134 (2018)
Historically program analysis methods are divided into two groups - static program analysis methods and dynamic program analysis methods. In this paper, we present a combined approach which allows to determine reachability for defects found by static
Externí odkaz:
https://doaj.org/article/179df6b024a44213b8716f31e34995a2
Autor:
V. A. Padaryan, A. I. Getman, M. A. Solovyev, M. G. Bakulin, A. I. Borzilov, V. V. Kaushan, I. N. Ledovskich, U. V. Markin, S. S. Panasenko
Publikováno v:
Труды Института системного программирования РАН, Vol 26, Iss 1, Pp 251-276 (2018)
This paper presents methods and tools for binary code analysis that have been developed in ISP RAS and their applications in fields of algorithm and data format recovery. The analysis subject is executable code of various general purpose CPU architec
Externí odkaz:
https://doaj.org/article/1bac56a8f1c2419aa171688835af8e35