A. A. Petukhov

Learn More
The number of reported web application vulnerabilities is increasing dramatically. The most of vulnerabilities result from improper input validation. This paper presents extensions to the Tainted Mode model which allows inter-module vulnerabilities detection. Besides, this paper presents a new approach to vulnerability analysis which incorporates advantages(More)
Covering arrays are used for generating tests for interfaces with a large number of parameters. In this paper, a new method is described for constructing homogeneous and heterogeneous covering arrays that is based on a combination of combinatorial and optimization methods. In a wide class of particular cases, the method speeds up the construction of arrays(More)
We study tight wavelet frames associated with symmetric compactly supported refinable functions, which are obtained with the unitary extension principle. We give a criterion for the existence of two symmetric or antisymmetric compactly supported framelets. All refinable masks of length up to 6 satisfying this criterion are found.
  • 1