Topic: [Lecture] the Theory and practice of the formal modeling it is vulnerable

In December read %subj % within the limits of capital IT Sec Pro course. Probably, it will be useful for those who is interested in questions of static analysis of applications. Actually, the approach described there is applicable to resolution and other nontrivial properties of the code, i.e. not only by criteria of vulnerability to any attacks, but also for search of the unattainable code, an estimation of a covering tests, initialization errors, etc. Offered model in this plan is general-purpose enough. Record: https://www.youtube.com/watch?v=h7SwURZ … e=youtu.be Slides: https://yadi.sk/i/rNjH5Az_3ScA54... <<RSDN@Home 1.3.16 alpha 5 rev. 60>>