Showing 1 - 8 results of 8 for search 'V. V. Kaushan', query time: 0.03s
Refine Results
-
1
Buffer overrun detection method in binary code by V. V. Kaushan
Published 2018-10-01
Article -
2
Automated exploit generation method for stack buffer overflow vulnerabilities by V. A. Padaryan, V. V. Kaushan, A. N. Fedotov
Published 2018-10-01
Article -
3
Compiler protection techniques against software vulnerabilities exploitation by A. R. Nurmukhametov, Sh. F. Kurmangaleev, V. V. Kaushan, S. S. Gaissaryan
Published 2018-10-01
Article -
4
Building security predicates for some types of vulnerabilities by A. N. Fedotov, V. V. Kaushan, S. S. Gaissaryan, Sh. F. Kurmangaleev
Published 2018-10-01
Article -
5
Search method for format string vulnerabilities by I. A. Vakhrushev, V. V. Kaushan, V. A. Padaryan, A. N. Fedotov
Published 2018-10-01
Article -
6
Memory violation detection method in binary code by V. V. Kaushan, A. Y.U. Mamontov, V. A. Padaryan, A. N. Fedotov
Published 2018-10-01
Article -
7
-
8
Methods and software tools for combined binary code analysis by V. A. Padaryan, A. I. Getman, M. A. Solovyev, M. G. Bakulin, A. I. Borzilov, V. V. Kaushan, I. N. Ledovskich, U. V. Markin, S. S. Panasenko
Published 2018-10-01
Article