Previous Page  13 / 14 Next Page
Information
Show Menu
Previous Page 13 / 14 Next Page
Page Background

[4] Chen H., Wagner D. MOPS: an infrastructure for examining security properties

of software.

Proc. of the 9th ACM conference on Computer and communications

security. CCS’02

. N.Y., 2002, pp. 235–244.

[5] Hovemeyer D., Spacco J., Pugh W. Evaluating and tuning a static analysis to find

null pointer bugs. CM SIGSOFT Software Engineering Notes, 2006, 31, 1 (Jan.),

pp. 13–19. DOI=

http://dx.doi.org/10.1145/1108768.1108798

[6] Logozzo F., F¨ahndrich M. On the Relative Completeness of Bytecode Analysis Versus

Source Code Analysis. LNCS. 4959, 2008, pp. 197–212.

[7] Seoa S.-H., Guptaa A., Sallama A.M., Bertinoa E., Yimb K. 2014. Detecting mobile

malware threats to homeland security through static analysis.

Journal of Network and

Computer Applications

, 2014, 38 (Feb.), pp. 43–53.

URL:

http://dx.doi.org/10.1016/j.jnca.2013.05.008

DOI: 10.1016/j.jnca.2013.05.008

[8] Zhu F., Wei J. Static analysis based invariant detection for commodity

operating systems.

Computers and Security

, 2014, no. 43, pp. 49–63.

DOI

=http://dx.doi.org/10.1016/j.cose.2014.02.00

[9] Osovetskiy L.G. Detection Technology Undeclared Capabilities (Ndv) for the

Certification of the Software Industry at the Request of Information Security.

Voprosy

kiberbezopasnosti

[Cybersecurity issues], 2015, no. 1 (9), pp. 60–64 (in Russ.).

[10] Barabanov A.V., Markov A.S., Tsirlov V.L. The Conformity Assessment of

Information Security Solutions According to the Common Criteria.

Informatsionnye

tekhnologii

[Information technologies], 2015, vol. 21, no. 4, pp. 264–270 (in Russ.).

[11] Barabanov A., Markov A. Modern Trends in The Regulatory Framework of the

Information Security Compliance Assessment in Russia Based on Common Criteria.

Proc. of the 8th International Conference on Security of Information and Networks

(Sochi, Russian Federation, September 8–10, 2015). SIN ’15. ACM New York, N.Y.,

USA, 2015, pp. 30–33. URL:

http://dx.doi.org/10.1145/2799979.2799980

DOI: 10.1145/2799979.2799980

[12] Static Analysis Technologies Evaluation Criteria v1.0. Ed. by Sherif Koussa;

Russian translation by Alec Shcherbakov, Alexey Markov,

Web Application Security

Consortium

, 2013. Available at:

http://projects.webappsec.org/w/page/71979863/Static%20Analysis%20Technologies

%20Evaluation%20Criteria%20-%20Russian

[13] Markov A.S., Fadin A.A. Systematics of vulnerabilities and security defects of

program resources.

Zasita informacii. Inside

, 2013, no. 3 (51), pp. 56–61 (in Russ.).

[14] Avetisyan A.I., Belevantsev A.A., Chuklyaev I.I. The Technologies of Static and

Dynamic Analyses Detecting Vulnerabilities of Software.

Voprosy kiberbezopasnosti

[Cybersecurity issues], 2014, no. 3 (4), pp. 20–28 (in Russ.).

[15] Medvedev N.V., Markov A.S., Fadin A.A. Application of static signature analysis

to detect defects in web applications security.

Nauka i obrazovanie

.

MGTU

im. N.E. Baumana

[Science & Education of the Bauman MSTU. Electronic Journal],

2012, no. 9, p. 21. Available at:

http://technomag.edu.ru/en/doc/461281.html

DOI: 10.7463/0912.0461281

[16] Boulanger, J.L., ed. Static Analysis of Software. The Abstract Interpretation. Wiley-

ISTE. 2011.

[17] Vylegzhanin V.V., Markin A.L., Markov A.S., Utochka R.A., Fadin A.A.,

Fambulov A.K., Tsirlov V.L. Sistema dlya opredeleniya programmnykh zakladok

[The System for Determining the Software Bugs]. Patent granting for useful model

no. RUS 114799. 29.12.2011.

[18] Markov A.S., Fadin A.A., Shvets V.V. Comparison of Software Code Security Static

Analyzers.

Zasita informacii. Inside

, 2015, no. 6 (66), pp. 2–7 (in Russ.).

[19] Zhidkov I.V., Kadushkin I.V. About the Signs of Potentially Dangerous Events in

Information Systems.

Voprosy kiberbezopasnosti

[Cybersecurity issues], 2014, no. 1

(2), pp. 40–48 (in Russ.).

110 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2016. № 1