Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Dangling pointer

Known as: Use-after-free, Dangling pointers, Wild reference 
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Many system components and network applications are written in languages that are prone to memory corruption vulnerabilities… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • table III
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Use-after-free vulnerabilities have become an important class of security problems due to the existence of mitigations that… Expand
  • table I
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-after-free (and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Information about glacier volume and ice thickness distribution is essential for many glaciological applications, but direct… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Abstract. A plume rise algorithm for wildfires was included in WRF-Chem, and applied to look at the impact of intense wildfires… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Abstract The marine algae are considered an important biomass source; however, their utilization as energy source is still low… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Methane seeps occur at depths extending to over 7000 m along the world's continental margins, but there is little information… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In reaction to Norman's (1999) essay on misuse of the term affordance in human-computer interaction literature, this article is a… Expand
Is this relevant?