@article{PDM_2009_3_a13,
author = {A. N. Makarov},
title = {Method for automated program errors search in complex data processing algorithms},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {117--127},
year = {2009},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/}
}
A. N. Makarov. Method for automated program errors search in complex data processing algorithms. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 117-127. http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/
[1] Koziol D., Lichfild D., Eitel D. i dr., Iskusstvo vzloma i zaschity sistemy, Piter, SPb., 2006, 416 pp.
[2] Khovard M., Leblank D., Zaschischennyi kod, 2-e izd., Izdatelsko-torgovyi dom “Russkaya Redaktsiya”, M., 2005, 704 pp.
[3] Khogland G., Mak-Grou G., Vzlom programmnogo obespecheniya: analiz i ispolzovanie koda, Izdatelskii dom “Vilyams”, M., 2005, 400 pp.
[4] Eilam E., Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005, 589 pp.
[5] Miller C., Peterson Z. N. J., Analysis of Mutation and Generation-Based Fuzzing, , 2007 securityevaluators.com/files/papers/analysisfuzzing.pdf
[6] Neystadt J., Automated Penetration Testing with White-Box Fuzzing, Microsoft Corporation, , 2008 msdn.microsoft.com/en-us/library/cc162782.aspx
[7] Levitin A. V., Algoritmy: vvedenie v razrabotku i analiz, Izdatelskii dom “Vilyams”, M., 2006, 576 pp.
[8] Kalbertson R., Braun K., Kobb G., Bystroe testirovanie, Izdatelskii dom “Vilyams”, M., 2002, 384 pp.
[9] Intel Architecture Software Developer's Manual. V. 3: System Programming, Intel, 1999