{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:01Z","timestamp":1773615601690,"version":"3.50.1"},"reference-count":23,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s014641162108023x","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"932-940","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution"],"prefix":"10.3103","volume":"55","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"P. V.","family":"Knyazev","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7419_CR1","unstructured":"Sparks, P., The route to a trillion devices, White Paper, ARM. 2017. https:\/\/community.arm.com\/cfs-file\/__key\/telligent-evolution-components-attachments\/01-1996-00-00-00-01-30-09\/ARM-_2D00_-The-route-to-a-trillion-devices-_2D00_-June-2017.pdf."},{"key":"7419_CR2","unstructured":"Stanislav, M. and Beardsley, T., Hacking IoT: A case study on baby monitor exposures and vulnerabilities, Rapid7 Report, 2015. https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/63\/2015\/11\/21031739\/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf."},{"key":"7419_CR3","doi-asserted-by":"publisher","first-page":"959","DOI":"10.3103\/S0146411618080217","volume":"52","author":"V.V. Platonov","year":"2018","unstructured":"Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0959\u2013964. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080217","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR4","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.3103\/S0146411619080121","volume":"53","author":"V.M. Krundyshev","year":"2019","unstructured":"Krundyshev, V.M., Preparing datasets for training in a neural network system of intrusion detection in industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1012\u20131016. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080121","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR5","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, Proc. 12th Int. Conf. on Security of Information and Networks, Sochi, Russia, 2019, New York: Association for Computing Machinery, 2019, pp.\u00a01\u20137. \u00a0https:\/\/doi.org\/10.1145\/3357613.3357623","DOI":"10.1145\/3357613.3357623"},{"key":"7419_CR6","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, pp. 1\u20136. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7419_CR7","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129\u2013135. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904022","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7419_CR8","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080151","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR9","doi-asserted-by":"publisher","unstructured":"Kalinin, M. and Zegzhda, P., AI-based security for the smart networks, 13th Int. Conf. on Security of Information and Networks, Merkez, Turkey, 2020, New York: Association for Computing Machinery, 2020, pp. 1\u20134. \u00a0https:\/\/doi.org\/10.1145\/3433174.3433593","DOI":"10.1145\/3433174.3433593"},{"key":"7419_CR10","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR12","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, IEEE Int. Conf. on Industrial Cyber Physical Systems (ICPS), Taipei, 2019, IEEE, 2019, pp.\u00a01\u20135. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2019.8854888","DOI":"10.1109\/ICPHYS.2019.8854888"},{"key":"7419_CR13","doi-asserted-by":"publisher","unstructured":"Lim, S., Kalinin, M., and Zegzhda, P., Bioinspired intrusion detection in ITC infrastructures, Technological Transformation: A New Role for Human, Machines and Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 10\u201322. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-64430-7_2","DOI":"10.1007\/978-3-030-64430-7_2"},{"key":"7419_CR14","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 818\u2013823. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390812","DOI":"10.1109\/ICPHYS.2018.8390812"},{"key":"7419_CR15","doi-asserted-by":"publisher","first-page":"972","DOI":"10.3103\/S0146411619080339","volume":"53","author":"D.P. Zegzhda","year":"2019","unstructured":"Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972\u2013979. https:\/\/doi.org\/10.3103\/S0146411619080339","journal-title":"Autom. Control Comput. Sci."},{"key":"7419_CR16","doi-asserted-by":"publisher","unstructured":"Zegzhda, P.D., Zegzhda, D.P., Aleksandrova, E.B., Kalinin, M.O., and Lavrova, D.S., Ot informatsionnoi bezopasnosti k kiberbezopasnosti. Opyt issledovatel\u2019skikh rabot i podgotovki kadrov v Sankt-Peterburgskom politekhnicheskom universitete Petra Velikogo (From Information Security to Cyber Security: Experience of Research and Training of Personnel at the Peter the Great St. Petersburg Polytechnic University), St. Petersburg: Izd. Politekh. Univ., 2017. \u00a0https:\/\/doi.org\/10.18720\/SPBPU\/2\/i17-197","DOI":"10.18720\/SPBPU\/2\/i17-197"},{"key":"7419_CR17","unstructured":"Miessler, D., Securing the internet of things: mapping attack surface areas using the OWASP IoT Top 10, in RSA Conf., San Francisco, 2015, pp. 20\u201324."},{"key":"7419_CR18","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C. Cadar","year":"2013","unstructured":"Cadar, C. and Sen, K., Symbolic execution for software testing: three decades later, Commun. ACM, 2013, vol.\u00a056, no. 2, pp. 82\u201390. \u00a0https:\/\/doi.org\/10.1145\/2408776.2408795","journal-title":"Commun. ACM"},{"key":"7419_CR19","doi-asserted-by":"publisher","unstructured":"Bucur, S., Ureche, V., Zamfir, C., and Candea, G., Parallel symbolic execution for automated real-world software testing, Proc. Sixth Conf. on Computer Systems, Salzburg, 2011, New York: Association for Computing Machinery, 2011, pp. 183\u2013198. \u00a0https:\/\/doi.org\/10.1145\/1966445.1966463","DOI":"10.1145\/1966445.1966463"},{"key":"7419_CR20","doi-asserted-by":"publisher","unstructured":"Garg, P., Ivan\u010di\u0107, F., Balakrishnan, G., Maeda, N., and Gupta, A., Feedback-directed unit test generation for C\/C++ using concolic execution, 35th Int. Conf. on Software Engineering (ICSE), San Francisco, 2013, IEEE, 2013, pp. 132\u2013141. \u00a0https:\/\/doi.org\/10.1109\/ICSE.2013.6606559","DOI":"10.1109\/ICSE.2013.6606559"},{"key":"7419_CR21","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129\u2013135. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904022","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7419_CR22","unstructured":"Ermolinskiy, A., Katti, S., Shenker, S., and Fowler, L., Towards practical taint tracking. EECS Department. Tech. Rep. UCB\/EECS-2010-92, Berkeley, Calif.: Univ. of California, 2010."},{"key":"7419_CR23","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3103\/S0146411620080246","volume":"54","author":"T.D. Ovasapyan","year":"2020","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Application of taint analysis to study the safety of software of the Internet of Things devices based on the ARM architecture, Autom. Control Comput. Sci., 2020, vol. 54, no\u00a08, pp. 834\u2013840. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080246","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108023X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162108023X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108023X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:05Z","timestamp":1773612125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162108023X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":23,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7419"],"URL":"https:\/\/doi.org\/10.3103\/s014641162108023x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"22 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}