Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,589,837 papers from all fields of science
Search
Sign In
Create Free Account
Buffer over-read
Known as:
Buffer overread
In computer security and programming, a buffer over-read is an anomaly where a program, while reading data from a buffer, overruns the buffer's…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Bounds checking
Buffer overflow
C++
Computer program
Expand
Broader (1)
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
IskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks
Spyridoula Gravani
,
Mohammad Hedayati
,
J. Criswell
,
M. Scott
arXiv.org
2019
Corpus ID: 75138331
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB) of today's computing…
Expand
2017
2017
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack
Xiaoguang Wang
,
Yong Qi
,
Chi Zhang
,
Saiyu Qi
,
Peijian Wang
Annual International Computer Software and…
2017
Corpus ID: 25645457
Software memory disclosure attacks, such as buffer over-read, often work quietly and would cause secret data leakage. The well…
Expand
2015
2015
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities
Jun Wang
,
Mingyi Zhao
,
Qiang Zeng
,
Dinghao Wu
,
Peng Liu
45th Annual IEEE/IFIP International Conference on…
2015
Corpus ID: 3959427
Buffer over-read vulnerabilities (e.g., Heartbleed) can lead to serious information leakage and monetary lost. Most of previous…
Expand
Highly Cited
2015
Highly Cited
2015
The BORG: Nanoprobing Binaries for Buffer Overreads
M. Neugschwandtner
,
P. M. Comparetti
,
I. Haller
,
H. Bos
Conference on Data and Application Security and…
2015
Corpus ID: 5788346
Automated program testing tools typically try to explore, and cover, as much of a tested program as possible, while attempting to…
Expand
2015
2015
Protecting Programs Against Memory Violation In Hardware
Antonio Lemos Maia Neto
,
Leandro Terra Cunha Melo
,
Omar Paranaiba Vilela Neto
,
F. M. Quintão Pereira
,
Leonardo Barbosa Oliveira
IEEE Latin America Transactions
2015
Corpus ID: 45358969
The C and C++ programming languages do not prevent ouf-of-bounds memory access, consequently leaving room to attacks such as…
Expand
2015
2015
Protecting Programs Against Memory Violation In Hardware
Antonio L. Maia Neto
,
Leandro T. C. Melo
,
O. V. Neto
,
Fernando Magno Quintão Pereira
,
Leonardo B. Oliveira
2015
Corpus ID: 208011020
The C and C++ programming languages do not prevent ouf-of-bounds memory access, consequently leaving room to attacks such as…
Expand
2013
2013
Частота встречаемости ВИЧ-инфекции и парентеральных вирусных гепатитов (в, с и g) у медицинских работников
Абдухалик Абдулхаевич Махмануров
,
Р А Турсунов
2013
Corpus ID: 58368712
The comparative analysis of the prevalence of parenteral viral hepatitis B, C and G in health care workers has revealed the high…
Expand
2012
2012
Сравнительная оценка иммуноферментных тест-систем для определения антител класса g к вирусу эпидемического паротита
Елена Викторовна Отрашевская
,
Е. К. Букин
,
А. В. Отрашевская
,
Георгий Михайлович Игнатьев
2012
Corpus ID: 70607296
Two enzyme immunoassays (ELISA) for mumps antibody detection using the Enzygnost (Germany) and Parotit-screen (Russia) were…
Expand
Highly Cited
2009
Highly Cited
2009
Breaking the memory secrecy assumption
Raoul Strackx
,
Yves Younan
,
Pieter Philippaerts
,
Frank Piessens
,
Sven Lachmund
,
T. Walter
European Workshop on System Security
2009
Corpus ID: 17259394
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications written in C and C++. The most…
Expand
2009
2009
Анализ комплементсвязывающей активности иммуноглобулинов g человека при неопластических процессах
О. А. Князева
2009
Corpus ID: 68076367
With the help of specific monoclonal antibodies using methods of immune-enzyme analysis and the reaction of complement bonding…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE