Skip to search formSkip to main contentSkip to account menu

Buffer overflow

Known as: Buffer overruns, Overflow, Buffer overflows 
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
High–integrity systems are deployed in order to realize safety–critical applications. To meet the rigorous requirements in this… 
2010
2010
Buffer overflow BOF is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data… 
Review
2008
Review
2008
In the first part of this article, popular vulnerability and attack types used in books, vulnerability disclosures, and databases… 
2007
2007
Power consumed by memory systems becomes a serious issue as the size of the memory installed increases. With various low power… 
Highly Cited
2005
Highly Cited
2005
Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms… 
2000
2000
Ethernet networks for automation systems promise standardized interworking between completely different devices from field level… 
1999
1999
Communication satellites are now being used to transport TCP/IP traffic between distant locations, and to offer Internet access… 
Highly Cited
1992
Highly Cited
1992
Delivery of multimedia traffic from distributed sources to a single destination relies on an accurate characterization or… 
Highly Cited
1991
Highly Cited
1991
An investigation of statistically based approaches to the design of buffer control algorithms for interfacing a compressed… 
Highly Cited
1991
Highly Cited
1991
Efforts aimed at producing device-quality YBa/sub 2/Cu/sub 3/O/sub 7- delta / (YBCO) films on Si, which have resulted in films…