Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,475,746 papers from all fields of science
Search
Sign In
Create Free Account
Buffer overflow
Known as:
Buffer overruns
, Overflow
, Buffer overflows
Expand
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Aliasing (computing)
Application security
Attack patterns
Bitstream
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
A System-on-a-Chip Platform for Mixed-Criticality Applications
Armin Wasicek
,
C. E. Salloum
,
H. Kopetz
IEEE International Symposium on Object/Component…
2010
Corpus ID: 8152373
High–integrity systems are deployed in order to realize safety–critical applications. To meet the rigorous requirements in this…
Expand
2010
2010
Monitoring Buffer Overflow Attacks: A Perennial Task
Hossain Shahriar
,
Mohammad Zulkernine
International Journal of Secure Software…
2010
Corpus ID: 8714168
Buffer overflow BOF is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data…
Expand
Review
2008
Review
2008
Classes of Vulnerabilities and Attacks
P. Meunier
2008
Corpus ID: 18801071
In the first part of this article, popular vulnerability and attack types used in books, vulnerability disclosures, and databases…
Expand
2007
2007
PABC: Power-Aware Buffer Cache Management for Low Power Consumption
Min Lee
,
Euiseong Seo
,
Joonwon Lee
,
Jinsoo Kim
IEEE transactions on computers
2007
Corpus ID: 7242878
Power consumed by memory systems becomes a serious issue as the size of the memory installed increases. With various low power…
Expand
Highly Cited
2005
Highly Cited
2005
Automatic generation of buffer overflow attack signatures: an approach based on program behavior models
Zhenkai Liang
,
R. Sekar
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 9680593
Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms…
Expand
2000
2000
Measurements in switched Ethernet networks used for automation systems
E. Vonnahme
,
S. Ruping
,
U. Ruckert
IEEE International Workshop on Factory…
2000
Corpus ID: 14041618
Ethernet networks for automation systems promise standardized interworking between completely different devices from field level…
Expand
1999
1999
On the Web: TCP Over Satellite - The Final Frontier
C. Metz
IEEE Internet Computing
1999
Corpus ID: 1112416
Communication satellites are now being used to transport TCP/IP traffic between distant locations, and to offer Internet access…
Expand
Highly Cited
1992
Highly Cited
1992
An Intermedia Skew Control System for Multimedia Data Presentation
T. Little
,
Frank Kao
International Workshop on Network and Operating…
1992
Corpus ID: 39795447
Delivery of multimedia traffic from distributed sources to a single destination relies on an accurate characterization or…
Expand
Highly Cited
1991
Highly Cited
1991
Statistically based buffer control policies for constant rate transmission of compressed digital video
J. Zdepski
,
D. Raychaudhuri
,
K. Joseph
IEEE Transactions on Communications
1991
Corpus ID: 5270075
An investigation of statistically based approaches to the design of buffer control algorithms for interfacing a compressed…
Expand
Highly Cited
1991
Highly Cited
1991
Buffer layers for high-quality epitaxial YBCO films on Si
D. Fork
,
D. Fenner
,
+4 authors
J. Boyce
IEEE transactions on applied superconductivity
1991
Corpus ID: 36200340
Efforts aimed at producing device-quality YBa/sub 2/Cu/sub 3/O/sub 7- delta / (YBCO) films on Si, which have resulted in films…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE