Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Heap overflow

Known as: Heap, Heap exploit, Overflow 
A heap overflow is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different manner to that of stack… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Andersen's pointer analysis becomes more precise when applied with full heap cloning but unscalable for large, heap-intensive… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Abstract Computational modelling of the flow of fluids in porous media has traditionally been at a macroscopic level where the… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Heap-based attacks depend on a combination of memory management error and an exploitable memory allocator. Many allocators… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper presents a new technique for exploiting heap overflows in JavaScript interpreters. Briefly, given a heap overflow… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Context-sensitive pointer analysis algorithms with full "heapcloning" are powerful but are widely considered to be too expensive… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We define a new decidable logic for expressing and checking invariants of programs that manipulate dynamically-allocated objects… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Measurements of inherent optical properties (IOP) were conducted over bottoms with different substrates by use of a sampling… Expand
  • figure 1
  • figure 2
  • table 2
  • table 4
  • figure 3
Is this relevant?
1997
1997
Two methods are presented for simulating the development of photolithographic profiles during the resist dissolution phase. These… Expand
Is this relevant?