Heap overflow

Known as: Heap, Heap exploit, Overflow 
A heap overflow is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different manner to that of stack… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Heap overflow is a prevalent memory corruption vulnerability, playing an important role in recent attacks. Finding such… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Memory corruption attacks may lead to complete takeover of systems. There are numerous works offering protection mechanisms for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
The last twenty years have witnessed the constant reaction of the security community to memory corruption attacks and the… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2013
2013
Heap based buffer overflows are a dangerous class of vulnerability. One countermeasure is randomizing the location of heap memory… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Buffer overflow attacks have been causing serious security problems for decades. While numerous approaches have been proposed to… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
Is this relevant?
2010
2010
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause… (More)
  • figure 3
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2008
2008
This paper presents a new technique for exploiting heap overflows in JavaScript interpreters. Briefly, given a heap overflow… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Context-sensitive pointer analysis algorithms with full "heapcloning" are powerful but are widely considered to be too expensive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2006
2006
While numerous approaches have been proposed to prevent stack overflows, heap overflows remain both a security vulnerability and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?