Buffer overflow

Known as: Buffer overruns, Buffer overflows, Stack smash 
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1968-2017
05010019682017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Buffer overflow attack is the most common and arguably the most dangerous attack method used in Internet security breach… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The size and complexity of software systems is growing, increasing the number of bugs. Many of these bugs constitute security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Static buffer overflow exploits belong to the most feared and frequently launched attacks on todays Internet. These exploits… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper presents a solution to the notorious buffer overflow attack problem. Using this solution, users can prevent attackers… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We consider two types of buffering policies that are used in network switches supporting QoS (Quality of Service). In the <italic… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?