A. A. Petukhov

Learn More
The number of reported web application vulnerabilities is increasing dramatically. The most of vulnerabilities result from improper input validation. This paper presents extensions to the Tainted Mode model which allows inter-module vulnerabilities detection. Besides, this paper presents a new approach to vulnerability analysis which incorporates advantages(More)
Covering arrays are used for generating tests for interfaces with a large number of parameters. In this paper, a new method is described for constructing homogeneous and heterogeneous covering arrays that is based on a combination of combinatorial and optimization methods. In a wide class of particular cases, the method speeds up the construction of arrays(More)
  • 1