Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Buffer overflow

Known as: Buffer overruns, Overflow, Buffer overflows 
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Practical attacks that exploit speculative execution can leak confidential information via microarchitectural side channels. The… Expand
Highly Cited
2013
Highly Cited
2013
Dowser is a 'guided' fuzzer that combines taint tracking, program analysis and symbolic execution to find buffer overflow and… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2006
Highly Cited
2006
With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
Five modern static analysis tools (ARCHER, BOON, Poly-Space C Verifier, Splint, and UNO) were evaluated using source code… Expand
  • figure 1
  • table 1
  • table 3
  • table 2
  • table 4
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2003
Highly Cited
2003
This thesis contributes to three research areas in software security, namely security requirements and intrusion prevention via… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
Buffer overflow attacks may be today's single most important security threat. This paper presents a new approach to mitigating… Expand
Highly Cited
2001
Highly Cited
2001
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vulnerabilities that can… Expand
  • figure 1
  • figure 2
  • figure 7
  • table 1
  • table 4
Highly Cited
1997
Highly Cited
1997
Every organisation from the scale of whole countries down to small companies has a list of system developments which have ended… Expand
  • figure 1
  • figure 2
  • figure 3