Articles from section "Software security"

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 15
  • Pages: 134-141

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 15
  • Pages: 121-133

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 0
  • 15
  • Pages: 32-40

ASPECTS OF DETECTING MALICIOUS INSTALLATION FILES USING MACHINE LEARNING ALGORITHMS

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 16
  • Pages: 37-46

DETECTING SOURCE CODE FRAGMENTS SIMILARITY WITH MACHINE LEARNING ALGORITHMS

Software security
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 62-71

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 3
  • 78
  • Pages: 83-96

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 0
  • 91
  • Pages: 30-39

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 4
  • 92
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 7
  • 128
  • Pages: 9-19

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 2
  • 97
  • Pages: 69-82