|
|
Publications in Math-Net.Ru |
Citations |
|
2017 |
1. |
A. N. Fedotov, V. V. Kaushan, S. S. Gaissaryan, Sh. F. Kurmangaleev, “Building security predicates for some types of vulnerabilities”, Proceedings of ISP RAS, 29:6 (2017), 151–162 |
2
|
|
2016 |
2. |
V. V. Kaushan, “Buffer overrun detection method in binary code”, Proceedings of ISP RAS, 28:5 (2016), 135–144 |
2
|
3. |
A. N. Fedotov, V. A. Padaryan, V. V. Kaushan, Sh. F. Kurmangaleev, A. V. Vishnyakov, A. R. Nurmukhametov, “Software defect severity estimation in presence of modern defense mechanisms”, Proceedings of ISP RAS, 28:5 (2016), 73–92 |
7
|
|
2015 |
4. |
I. A. Vakhrushev, V. V. Kaushan, V. A. Padaryan, A. N. Fedotov, “Search method for format string vulnerabilities”, Proceedings of ISP RAS, 27:4 (2015), 23–38 |
3
|
5. |
V. V. Kaushan, A. YU. Mamontov, V. A. Padaryan, A. N. Fedotov, “Memory violation detection method in binary code”, Proceedings of ISP RAS, 27:2 (2015), 105–126 |
2
|
|
Organisations |
|
|