The number of reported web application vulnerabilities is increasing dramatically. The most of vulnerabilities result from improper input validation. This paper presents extensions to the Tainted Mode model which allows inter-module vulnerabilities detection. Besides, this paper presents a new approach to vulnerability analysis which incorporates advantages… (More)
Covering arrays are used for generating tests for interfaces with a large number of parameters. In this paper, a new method is described for constructing homogeneous and heterogeneous covering arrays that is based on a combination of combinatorial and optimization methods. In a wide class of particular cases, the method speeds up the construction of arrays… (More)
In this work we studied the approximation of the fundamental solution of the Laplace operator in two-dimensional space u = log(|x|) by harmonic polynomials. We analyzed the best approximation in the semi-ring with fixed outer radius and inner radius ? tending to zero. We observed exponential convergence in the degree of polynomials used for approximation.… (More)
We study tight wavelet frames associated with symmetric compactly supported refinable functions, which are obtained with the unitary extension principle. We give a criterion for the existence of two symmetric or antisymmetric compactly supported framelets. All refinable masks of length up to 6 satisfying this criterion are found.