Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_3_a13, author = {A. N. Makarov}, title = {Method for automated program errors search in complex data processing algorithms}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {117--127}, publisher = {mathdoc}, number = {3}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/} }
A. N. Makarov. Method for automated program errors search in complex data processing algorithms. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 117-127. http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/
[1] Koziol D., Lichfild D., Eitel D. i dr., Iskusstvo vzloma i zaschity sistemy, Piter, SPb., 2006, 416 pp.
[2] Khovard M., Leblank D., Zaschischennyi kod, 2-e izd., Izdatelsko-torgovyi dom “Russkaya Redaktsiya”, M., 2005, 704 pp.
[3] Khogland G., Mak-Grou G., Vzlom programmnogo obespecheniya: analiz i ispolzovanie koda, Izdatelskii dom “Vilyams”, M., 2005, 400 pp.
[4] Eilam E., Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005, 589 pp.
[5] Miller C., Peterson Z. N. J., Analysis of Mutation and Generation-Based Fuzzing, , 2007 securityevaluators.com/files/papers/analysisfuzzing.pdf
[6] Neystadt J., Automated Penetration Testing with White-Box Fuzzing, Microsoft Corporation, , 2008 msdn.microsoft.com/en-us/library/cc162782.aspx
[7] Levitin A. V., Algoritmy: vvedenie v razrabotku i analiz, Izdatelskii dom “Vilyams”, M., 2006, 576 pp.
[8] Kalbertson R., Braun K., Kobb G., Bystroe testirovanie, Izdatelskii dom “Vilyams”, M., 2002, 384 pp.
[9] Intel Architecture Software Developer's Manual. V. 3: System Programming, Intel, 1999