|
|
Publications in Math-Net.Ru |
Citations |
|
2023 |
1. |
I. Yegorov, E. Kobrin, D. Parygina, A. Vishnyakov, A. Fedotov, “Python fuzzing for trustworthy machine learning frameworks”, Zap. Nauchn. Sem. POMI, 530 (2023), 38–50 |
|
2022 |
2. |
D. Yu. Turdakov, A. I. Avetisyan, K. V. Arkhipenko, A. V. Antsiferova, D. S. Vatolin, S. S. Volkov, A. V. Gasnikov, D. A. Devyatkin, M. D. Drobyshevskiy, A. P. Kovalenko, M. I. Krivonosov, N. V. Lukashevich, V. A. Malykh, S. I. Nikolenko, I. V. Oseledets, A. I. Perminov, I. V. Sochenkov, M. M. Tihomirov, A. N. Fedotov, M. Yu. Khachay, “Trusted artificial intelligence: challenges and promising solutions”, Dokl. RAN. Math. Inf. Proc. Upr., 508 (2022), 13–18 ; Dokl. Math., 106:suppl. 1 (2022), S9–S13 |
1
|
3. |
A. V. Vishnyakov, E. A. Kobrin, A. N. Fedotov, “Error detection in binary code with dynamic symbolic execution”, Proceedings of ISP RAS, 34:2 (2022), 25–42 |
1
|
|
2020 |
4. |
A. N. Fedotov, Sh. F. Kurmangaleev, “CASR: core dump analysis and severity reporter tool”, Proceedings of ISP RAS, 32:4 (2020), 89–96 |
1
|
|
2017 |
5. |
A. N. Fedotov, V. V. Kaushan, S. S. Gaissaryan, Sh. F. Kurmangaleev, “Building security predicates for some types of vulnerabilities”, Proceedings of ISP RAS, 29:6 (2017), 151–162 |
2
|
|
2016 |
6. |
A. N. Fedotov, V. A. Padaryan, V. V. Kaushan, Sh. F. Kurmangaleev, A. V. Vishnyakov, A. R. Nurmukhametov, “Software defect severity estimation in presence of modern defense mechanisms”, Proceedings of ISP RAS, 28:5 (2016), 73–92 |
7
|
7. |
A. N. Fedotov, “Method for exploitability estimation of program bugs”, Proceedings of ISP RAS, 28:4 (2016), 137–148 |
3
|
|
2015 |
8. |
I. A. Vakhrushev, V. V. Kaushan, V. A. Padaryan, A. N. Fedotov, “Search method for format string vulnerabilities”, Proceedings of ISP RAS, 27:4 (2015), 23–38 |
3
|
9. |
V. V. Kaushan, A. YU. Mamontov, V. A. Padaryan, A. N. Fedotov, “Memory violation detection method in binary code”, Proceedings of ISP RAS, 27:2 (2015), 105–126 |
2
|
|
Organisations |
|
|
|
|