|
|
Publications in Math-Net.Ru |
Citations |
|
2021 |
1. |
A. E. Borodin, A. V. Goremykin, S. P. Vartanov, A. A. Belevantsev, “Searching for tainted vulnerabilities in static analysis tool Svace”, Proceedings of ISP RAS, 33:1 (2021), 7–32 |
3
|
|
2020 |
2. |
S. S. Sargsyan, V. G. Vardanyan, J. A. Hakobyan, A. M. Aghabalyan, M. S. Mehrabyan, Sh. F. Kurmangaleev, A. Yu. Gerasimov, M. K. Ermakov, S. P. Vartanov, “Automatic API fuzzing framework”, Proceedings of ISP RAS, 32:2 (2020), 161–173 |
|
2017 |
3. |
A. Y. Gerasimov, L. V. Kruglov, M. K. Ermakov, S. P. Vartanov, “An approach of reachability determination for static analysis defects with help of dynamic symbolic execution”, Proceedings of ISP RAS, 29:5 (2017), 111–134 |
2
|
4. |
S. P. Vartanov, A. Y. Gerasimov, M. K. Ermakov, D. O. Kutz, A. A. Novikov, “Dynamic analysis of programs with graphical user interface based on symbolic execution”, Proceedings of ISP RAS, 29:1 (2017), 149–166 |
2
|
5. |
S. P. Vartanov, M. K. Ermakov, A. Y. Gerasimov, “Applying dynamic analysis to programs running in interpreted environments”, Proceedings of ISP RAS, 29:1 (2017), 135–148 |
|
2015 |
6. |
M. Ermakov, S. Vartanov, “Detecting race conditions in Java programs using dynamic analysis”, Proceedings of ISP RAS, 27:2 (2015), 39–52 |
7. |
M. Ermakov, S. Vartanov, “Dynamic Java program analysis using virtual machine modification”, Proceedings of ISP RAS, 27:2 (2015), 23–38 |
1
|
8. |
S. P. Vartanov, M. K. Ermakov, “Applying Java bytecode static instrumentation for software dynamic analysis”, Proceedings of ISP RAS, 27:1 (2015), 25–38 |
2
|
9. |
M. K. Ermakov, S. P. Vartanov, “Dynamic analysis of ARM ELF shared libraries using static binary instrumentation”, Proceedings of ISP RAS, 27:1 (2015), 5–24 |
2
|
|
Organisations |
|
|
|
|