Hayk Aslanyan

ORCID: 0000-0002-7320-4835
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Crystallography and Radiation Phenomena
  • Software Engineering Research
  • Advanced Malware Detection Techniques
  • Software Reliability and Analysis Research
  • Optical and Acousto-Optic Technologies
  • Ultrasonics and Acoustic Wave Propagation
  • Solid-state spectroscopy and crystallography
  • Terahertz technology and applications
  • Parallel Computing and Optimization Techniques
  • Advanced X-ray Imaging Techniques
  • Electromagnetic Fields and Biological Effects
  • Nuclear materials and radiation effects
  • Seismic Waves and Analysis
  • Laser-Plasma Interactions and Diagnostics
  • Radiation Effects in Electronics
  • Embedded Systems Design Techniques
  • Numerical methods in inverse problems
  • Web Application Security Vulnerabilities
  • Electromagnetic Effects on Materials
  • Particle Accelerators and Free-Electron Lasers
  • Pulsed Power Technology Applications
  • Microwave Imaging and Scattering Analysis
  • Web Data Mining and Analysis
  • Security and Verification in Computing

Russian-Armenian University
2019-2025

Institute for Informatics and Automation Problems
2010-2013

National Academy of Sciences of Armenia
1983-1991

Comparison of two binary files has many practical applications: the ability to detect programmatic changes between versions, find old versions statically linked libraries prevent use well-known bugs, malware analysis, etc. In this article, a framework for comparison is presented. Framework uses IdaPro [1] disassembler and Binnavi [2] platform recover structure target program represent it as call graph (CG). A dependence (PDG) corresponds each vertex CG. The proposed algorithm consists main...

10.1109/ispras.2017.00013 article EN 2017-11-01

Software developers make mistakes that can lead to failures of a software product. One approach detect defects is static analysis: examine code without execution. Currently, various source analysis tools are widely used defects. However, not enough. The reason for this the use third-party binary libraries, unprovability correctness all compiler optimizations. This paper introduces BinSide : framework detection. It does interprocedural, context-sensitive and flow-sensitive analysis. uses...

10.1109/ivmem51402.2020.00007 article EN 2020-09-01

Memory leaks are still one of the common bugs in programs written languages without garbage collectors. There is a list methods to detect such bugs. One approaches use static analysis. This paper discusses analysis for memory leak detection. Mainly those two stages. First, they different types graphs find faster but with less precision. Then, detected cases path-sensitive increase Additionally, we tested available tools on Juliet test suite. We chose false positive rate (FPR) and negative...

10.1109/ivmem57067.2022.9983955 article EN 2022-09-23

Certain problems are considered of the X-ray radiation diffraction in oscillating crystals within framework Takagi strict dynamic theory, both, case one-dimensional deformation and a two-dimensional one. Es werden gewisse Probleme der Röntgenbeugung oszillierenden Kristallen im Rahmen dynamischen Theorie von sowohl für den Fall eindimensionaler als auch zwei-dimensionaler Deformation untersucht.

10.1002/pssa.2210920204 article EN physica status solidi (a) 1985-12-16

Software developers often copy and paste code within a project. Due to the possible existence of defects in initial fragment, this can lead propagation across changes new version (patches) usually contain bug fixes, which be used for detecting similar The purpose work is develop method analyzing nature patches between versions executables finding unpatched fragments. At first, two are compared common changed parts code. Then, determines that possibly fixes bugs. final step detection It based...

10.1109/ivmem.2019.00014 article EN 2019-09-01

Binary code comparison tools are widely used to analyze vulnerabilities, search for malicious code, detect copyright violations, etc. The article discusses three - BCC, BinDiff, Diaphora. Those based on static analysis of programs. receive as input data two versions the program in binary form and match their functions. purpose is assess quality tools. We developed a testing system automatically determine precision recall each instrument. F <inf xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/ivmem53963.2021.00006 article EN 2021-09-01

In this paper we present a novel code analysis platform referred as "GENESISP". Its aim is to collect vast database of open source software and apply several integrated analyses. This allows understand relations within binary code, well detect existing defects. All the analyses are compatible with each other can be combined, which provides more robust possibilities. first stage framework tries collect, process store related data into database. Various resources used for that purpose. For...

10.1109/ispras51486.2020.00012 article EN 2020-12-01

The new scheme of crystalline undulator based on coherent bremsstrahlung from above barrier relativistic electrons interacting with a system atomic strings periodically deformed by acoustic wave is proposed and studied in the work. possibility to generate X-rays range about 10 keV more energies 100 MeV shown. Spectral-angular density emission being considered may be six times greater than ordinary CB.

10.1142/s0217984910025140 article EN Modern Physics Letters B 2010-10-14

The paper is devoted to the study of influence crystalline lattice distortions due external excitations (acoustic vibrations, temperature gradient, etc.) on Quasicerenkov radiation. Equations describing radiation charged particles in distorted crystals are derived. These equations solved numerically. It shown that certain types deformations may intensify by several times.

10.48550/arxiv.physics/9902055 preprint EN other-oa arXiv (Cornell University) 1999-01-01

It is common practice to use third-party software in projects, which can lead security problems. There are numerous cases when the known vulnerability was fixed upstream repository of project but still exists other projects. We present a framework for systematic analysis and detection publicly vulnerabilities large codebase. On first stage, vast codebase open-source projects collected. second each vulnerability, we try find corresponding source extract fixing patch. Based on extracted...

10.1109/ivmem53963.2021.00019 article EN 2021-09-01

Code comparison methods and tools are widely spread. However, most of the approaches target either only source code or binary code, for matching to less investigated. In this article, we introduce Bin2Source: a tool code. It gets as input (without debug information) with its compilation commands. As result, returns matched functions instructions The major advantage Bin2Source compared existing is capacity perform instruction-to-instruction matching. can be used copyright infringements...

10.1109/ispras53967.2021.00006 article EN 2021-12-01
Coming Soon ...