{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:08Z","timestamp":1773615608411,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s014641162570083x","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:19Z","timestamp":1771936459000},"page":"1300-1306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development"],"prefix":"10.3103","volume":"59","author":[{"given":"A. S.","family":"Cherevan\u2019","sequence":"first","affiliation":[]},{"given":"A. P.","family":"Lapsar\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7918_CR1","unstructured":"Pashchenko, D., Sovremennaya vysokotekhnologichnaya kompaniya v IT-otrasli (Modern High-Tech Company in IT Industry), Kazan; Buk, 2022."},{"key":"7918_CR2","unstructured":"Cawley, C., Top data breaches and cyber attacks in 2024, Techradar. https:\/\/www.techradar.com\/pro\/top-data-breaches-and-cyber-attacks-in-2024. Cited August 1, 2024."},{"key":"7918_CR3","doi-asserted-by":"publisher","unstructured":"Sallinger, S., Weissenbacher, G., and Zuleger, F., A formalization of heisenbugs and their causes, Software Engineering and Formal Methods, Ferreira, C. and Willemse, T.A.C., Eds., Cham: Springer, 2023, vol. 14323, pp.\u00a0282\u2013300. https:\/\/doi.org\/10.1007\/978-3-031-47115-5_16","DOI":"10.1007\/978-3-031-47115-5_16"},{"key":"7918_CR4","unstructured":"Voloshin, I.P., Risk factors in the development of software, Informatsionnaya Bezopasnost\u2019 Regionov, 2016, no.\u00a03, pp. 15\u201319."},{"key":"7918_CR5","unstructured":"Fatkhi, V.A. and V, N., Application security testing, Inzhenernyi Vestnik Dona, 2021, no. 5, pp. 108\u2013120."},{"key":"7918_CR6","unstructured":"Abidarova, A.A., Cyberattacks on information and automated systems and complexes, Izvestiya Tul\u2019skogo Gosudarstvennogo Universiteta. Tekhnicheskie Nauki, 2020, no. 11, pp. 347\u2013349."},{"key":"7918_CR7","unstructured":"Adamovich, V.V. and Romanova, O.L., MITM attack as a way of committing crimes in the field of information technology, Problemy Pravovoi i Tekhnicheskoi Zashchity Informatsii, 2023, no. 11, pp. 71\u201376."},{"key":"7918_CR8","doi-asserted-by":"publisher","unstructured":"Hidhaya, S.F. and Geetha, A., Detection of vulnerabilities caused by webview exploitation in smartphone, 2017 Ninth International Conference on Advanced Computing (ICoAC), IEEE, 2017, pp. 357\u2013364. https:\/\/doi.org\/10.1109\/icoac.2017.8441444","DOI":"10.1109\/icoac.2017.8441444"},{"key":"7918_CR9","unstructured":"Maksimov, V., Progressive parallelism in practice: From classical threads to virtual threads in Java and coroutines in Kotlin, Aktual\u2019nye Issledovaniya, vol. 42."},{"key":"7918_CR10","doi-asserted-by":"publisher","unstructured":"Cherevko, N.A. and Belov, Yu.S., Automation of Android applications testing using machine learning activities classification, Nauchnoe Obozrenie. Tekhnicheskie Nauki, 2022, no. 2, pp. 21\u201325. https:\/\/doi.org\/10.17513\/srts.1390","DOI":"10.17513\/srts.1390"},{"key":"7918_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.26583\/bit.2024.2.07","volume":"31","author":"A.S. Cherevan\u2019","year":"2024","unstructured":"Cherevan\u2019, A.S. and Lapsar\u2019, A.P., Problems of floating vulnerabilities in ensuring mobile application security, Bezopasnost\u2019 \n               Informatsionnykh Tekhnologii, 2024, vol. 31, no. 2, pp. 111\u2013120. https:\/\/doi.org\/10.26583\/bit.2024.2.07","journal-title":"Informatsionnykh Tekhnologii"},{"key":"7918_CR12","first-page":"195","volume":"2","author":"A.S. Voinov","year":"2023","unstructured":"Voinov, A.S., Researching vulnerabilities and threats in mobile applications: Countermeasure strategies, Vestnik Nauki, 2023, vol. 2, no. 9, pp. 195\u2013200.","journal-title":"Vestnik Nauki"},{"key":"7918_CR13","first-page":"97","volume":"1","author":"A. Repova","year":"2024","unstructured":"Repova, A., Developing secure mobile applications and securing mobile devices, Vsemirnyi Uchenyi, 2024, vol.\u00a01, no. 23, pp. 97\u2013104.","journal-title":"Vsemirnyi Uchenyi"},{"key":"7918_CR14","unstructured":"Gavrilenko, A. and Korchagina, E., Analysis of information security of mobile devices, Aktual\u2019nye problemy deyatel\u2019nosti podrazdelenii UIS. Sbornik materialov Vserossiiskoi nauchno-prakticheskoi konferentsii (Actual Problems of Activity of Correctional Service Units: Proceedings of the All-Russian Scientific and Practical Conference), Voronezh: Nauchnaya Kniga, 2022, pp. 141\u2013143."},{"key":"7918_CR15","first-page":"593","volume":"2023","author":"I.A. Golubnichev","year":"2023","unstructured":"Golubnichev, I.A., Kosov, N.A., and Krasov, A.V., Study of methods for automated vulnerability analysis of mobile applications on Android, Aktual\u2019nye problemy infotelekommunikatsii v nauke i obrazovanii (APINO 2023) (Topical Problems of Infotelecommunications in Science and Education (APINO 2023)), St. Petersburg, 2023, St. Petersburg: Sankt-Peterburgskii Gosudarstvennyi Universitet Telekommunikatsii im. prof. M.A. Bonch-Bruevicha, 2023, pp. 593\u2013600.","journal-title":"Bonch-Bruevicha"},{"key":"7918_CR16","unstructured":"Loginova, N.V., Methods of detection and prevention of vulnerabilities in frontend-development, Vestnik Nauki i Obrazovaniya, 2024, no. 2, part 1, pp. 17\u201325."},{"key":"7918_CR17","doi-asserted-by":"publisher","first-page":"195","DOI":"10.15514\/ispras-2021-33(4)-14","volume":"33","author":"R.V. Baev","year":"2021","unstructured":"Baev, R.V., Skvortsov, L.V., Kudryashov, E.A., Buchatskiy, R.A., and Zhuykov, R.A., Prevention of vulnerabilities arising from optimization of code with Undefined Behavior, Trudy Instituta Sistemnogo Programmirovaniya Rossiiskoi Akademii Nauk, 2021, vol. 33, no. 4, pp. 195\u2013210. https:\/\/doi.org\/10.15514\/ispras-2021-33(4)-14","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Rossiiskoi Akademii Nauk"},{"key":"7918_CR18","unstructured":"Musuvathi, M., Qadeer, S., Ball, T., and Basltr, G., Finding and reproducing heisenburg in concurrent programs, 8th USENIX Symposium on Operating Systems Design and Implementation, 2008, pp. 267\u2013280."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570083X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162570083X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570083X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:11Z","timestamp":1773612131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162570083X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7918"],"URL":"https:\/\/doi.org\/10.3103\/s014641162570083x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"19 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}