Method for automated program errors search in complex data processing algorithms
Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 117-127.

Voir la notice de l'article provenant de la source Math-Net.Ru

In the paper, an original method developed by the author is discussed. The method permits to search program errors in software without source code. The method is based on stress testing and automated software trace. In this case, the test data can be formed statically or dynamically on the base of tracing results.
@article{PDM_2009_3_a13,
     author = {A. N. Makarov},
     title = {Method for automated program errors search in complex data processing algorithms},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {117--127},
     publisher = {mathdoc},
     number = {3},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/}
}
TY  - JOUR
AU  - A. N. Makarov
TI  - Method for automated program errors search in complex data processing algorithms
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 117
EP  - 127
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/
LA  - ru
ID  - PDM_2009_3_a13
ER  - 
%0 Journal Article
%A A. N. Makarov
%T Method for automated program errors search in complex data processing algorithms
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 117-127
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/
%G ru
%F PDM_2009_3_a13
A. N. Makarov. Method for automated program errors search in complex data processing algorithms. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 117-127. http://geodesic.mathdoc.fr/item/PDM_2009_3_a13/

[1] Koziol D., Lichfild D., Eitel D. i dr., Iskusstvo vzloma i zaschity sistemy, Piter, SPb., 2006, 416 pp.

[2] Khovard M., Leblank D., Zaschischennyi kod, 2-e izd., Izdatelsko-torgovyi dom “Russkaya Redaktsiya”, M., 2005, 704 pp.

[3] Khogland G., Mak-Grou G., Vzlom programmnogo obespecheniya: analiz i ispolzovanie koda, Izdatelskii dom “Vilyams”, M., 2005, 400 pp.

[4] Eilam E., Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005, 589 pp.

[5] Miller C., Peterson Z. N. J., Analysis of Mutation and Generation-Based Fuzzing, , 2007 securityevaluators.com/files/papers/analysisfuzzing.pdf

[6] Neystadt J., Automated Penetration Testing with White-Box Fuzzing, Microsoft Corporation, , 2008 msdn.microsoft.com/en-us/library/cc162782.aspx

[7] Levitin A. V., Algoritmy: vvedenie v razrabotku i analiz, Izdatelskii dom “Vilyams”, M., 2006, 576 pp.

[8] Kalbertson R., Braun K., Kobb G., Bystroe testirovanie, Izdatelskii dom “Vilyams”, M., 2002, 384 pp.

[9] Intel Architecture Software Developer's Manual. V. 3: System Programming, Intel, 1999