Mariam Arutunian

ORCID: 0000-0002-2420-7968
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Reliability and Analysis Research
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Scientific Computing and Data Management
  • Radiation Effects in Electronics
  • Advanced Data Processing Techniques
  • Engineering Education and Technology
  • Formal Methods in Verification
  • Web Data Mining and Analysis
  • Software System Performance and Reliability
  • Web Application Security Vulnerabilities

Russian-Armenian University
2019-2025

Existed methods of code clones detection have some restrictions. Textual and lexical approaches cannot detect strongly modified fragments code. Syntactic metrics based strong modifications with low accuracy. On the contrary, semantic approach accurately detects cloned small changes as well ones. Methods on this are not scalable for analysis large projects. This paper describes LLVM-based clone framework, which uses program analysis. It has high accuracy is million lines source The tool...

10.1109/csitechnol.2015.7358259 article EN 2015-09-01

Comparison of two binary files has many practical applications: the ability to detect programmatic changes between versions, find old versions statically linked libraries prevent use well-known bugs, malware analysis, etc. In this article, a framework for comparison is presented. Framework uses IdaPro [1] disassembler and Binnavi [2] platform recover structure target program represent it as call graph (CG). A dependence (PDG) corresponds each vertex CG. The proposed algorithm consists main...

10.1109/ispras.2017.00013 article EN 2017-11-01

During the software development developers often copy and paste fragments of code to achieve desired result. Copying can lead variety errors, as well increase size source binary code. The problem finding semantically similar pieces (clones) in becomes actual due unavailability many programs. first part article is dedicated analysis existing methods for clone In second we provide a newly developed tool clones work divided into three main stages. stage based on Binnavi [1] framework, which...

10.15514/ispras-2016-28(5)-13 article EN cc-by Proceedings of the Institute for System Programming of RAS 2016-01-01

Software developers make mistakes that can lead to failures of a software product. One approach detect defects is static analysis: examine code without execution. Currently, various source analysis tools are widely used defects. However, not enough. The reason for this the use third-party binary libraries, unprovability correctness all compiler optimizations. This paper introduces BinSide : framework detection. It does interprocedural, context-sensitive and flow-sensitive analysis. uses...

10.1109/ivmem51402.2020.00007 article EN 2020-09-01

This article presents novel method for efficient fuzzing of programs accepting complex structured data. It generates input data based on formal grammar description. Data generator is periodically autoconfigured target code coverage. means that the type generated dynamically changed to increase uses descriptions BNF (Backus-Naur Form) rules in ANTLR (ANother Tool Language Recognition) platform. More than 250 languages and formats are supported. Every rule designed as universal pushdown...

10.1109/ivmem57067.2022.9983953 article EN 2022-09-23

Software developers often copy and paste code within a project. Due to the possible existence of defects in initial fragment, this can lead propagation across changes new version (patches) usually contain bug fixes, which be used for detecting similar The purpose work is develop method analyzing nature patches between versions executables finding unpatched fragments. At first, two are compared common changed parts code. Then, determines that possibly fixes bugs. final step detection It based...

10.1109/ivmem.2019.00014 article EN 2019-09-01

Binary code comparison tools are widely used to analyze vulnerabilities, search for malicious code, detect copyright violations, etc. The article discusses three - BCC, BinDiff, Diaphora. Those based on static analysis of programs. receive as input data two versions the program in binary form and match their functions. purpose is assess quality tools. We developed a testing system automatically determine precision recall each instrument. F <inf xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/ivmem53963.2021.00006 article EN 2021-09-01

Software developers often resort to borrowing code both within one project and from another. Due the possible content of errors in source snippet, this can lead error propagation across program. Libraries used without may also contain potential errors. The purpose work is developing methods for analyzing nature changes between versions software components which missing. And potentially related correction defects, search similar, but not fixed defects using clone methods. implementation...

10.15514/ispras-2018-31(1)-3 article EN cc-by Proceedings of the Institute for System Programming of RAS 2019-01-01

Recently, more and software companies are interested in tools to improve the stability security of their product. The closed libraries third-party applications used by developers may contain defects, use which an attacker or a user lead violation application. In some cases, source code problem areas be missing. At moment, static methods for finding defects gaining popularity, allow that unattainable dynamic methods. Static algorithms studying model program, including call graph, control...

10.15514/ispras-2019-31(6)-5 article EN cc-by Proceedings of the Institute for System Programming of RAS 2019-01-01

Code comparison methods and tools are widely spread. However, most of the approaches target either only source code or binary code, for matching to less investigated. In this article, we introduce Bin2Source: a tool code. It gets as input (without debug information) with its compilation commands. As result, returns matched functions instructions The major advantage Bin2Source compared existing is capacity perform instruction-to-instruction matching. can be used copyright infringements...

10.1109/ispras53967.2021.00006 article EN 2021-12-01
Coming Soon ...