Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Buffer overflow

Known as: Buffer overruns, Overflow, Buffer overflows 
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Practical attacks that exploit speculative execution can leak confidential information via microarchitectural side channels. The… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Dowser is a 'guided' fuzzer that combines taint tracking, program analysis and symbolic execution to find buffer overflow and… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper, we consider a simple network consisting of a source, a half-duplex decode-and-forward relay, and a destination. We… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Five modern static analysis tools (ARCHER, BOON, Poly-Space C Verifier, Splint, and UNO) were evaluated using source code… Expand
  • figure 1
  • table 1
  • table 3
  • table 2
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vulnerabilities that can… Expand
  • figure 1
  • figure 2
  • figure 7
  • table 1
  • table 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Buffer overflow attacks may be today's single most important security threat. This paper presents a new approach to mitigating… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Every organisation from the scale of whole countries down to small companies has a list of system developments which have ended… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?