Many modern static analysis tools provide toolkits that allow creation of custom checkers by end users. The majority of existing solutions choose AST-based approaches to provide a simpler declarative API. Solutions ba...
详细信息
This paper presents a method for build interception of Go projects and utilizing the intercepted information for building an intermediate representation used in a static analyzer. The paper discusses two approaches: h...
详细信息
We develop the document analysis system, which is able to extract text and text metadata (such as font size and style), and restore the document structure. Some parts of the pipeline are based on machine learning thus...
详细信息
Directed fuzzing performs best for targeted program testing via estimating the impact of each input in reaching predefined program points. But due to insufficient analysis of the program structure and lack of flexibil...
详细信息
Crash report analysis is a necessary step before developers begin fixing errors. Fuzzing or hybrid (with dynamic symbolic execution) fuzzing is often used in the secure Development lifecycle. Modern fuzzers could prod...
详细信息
We propose a two-stage approach for TOC generation from financial documents. This work connected with participation in FinTOC-2021 Shared Task: "Financial Document Structure Extraction". The competition cont...
详细信息
Interactive rendering of 3D scenes with a big number of objects is computationally intensive. It is hard to determine an efficient way of rendering command recording and submission. Command buffers can be recorded eac...
详细信息
Test generation is an important issue when checking functional and nonfunctional requirements for components of distributed systems and formal models are utilized in order to derive test suites with guaranteed fault c...
详细信息
In the last 15 years many dedicated leak detection tools utilizing novel approaches were designed. Unfortunately, most of them are hard to implement and fully utilize in the scope of a multi-purpose industrial analyze...
详细信息
We consider a distributed network, the topology of which is described by a undirected tree without multiple edges and loops. The network itself can change its topology using special "commands" supplied by it...
详细信息
暂无评论