Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Heartbleed

Known as: Heartbleed bug, Heartbleed vulnerability, Heart bleed 
Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Users and Internet service providers (ISPs) are constantly affected by denial-of-service (DoS) attacks. This cyber threat… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
2016
2016
Despite recent emerging development in intrusion detection or network monitoring, malicious attacks and misbehavior remain a high… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Review
2016
Review
2016
Background Gastrointestinal stromal tumours (GIST) are KIT-expressing signal driven mesenchymal tumours of the gastrointestinal… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
2015
2015
Abstract Software updates and security patches have become a standard method to fix known and recently discovered security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2015
Highly Cited
2015
Taint-style vulnerabilities are a persistent problem in software development, as the recently discovered "Heart bleed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2015
Highly Cited
2015
With the general availability of closed-source software for various CPU architectures, there is a need to identify security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2015
Highly Cited
2015
Cryptography plays an important role in computer and communication security. In practical implementations of cryptosystems, the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2014
Highly Cited
2014
The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Highly Cited
2014
Highly Cited
2014
Central to the secure operation of a public key infrastructure (PKI) is the ability to revoke certificates. While much of users… Expand
2014
2014
In this paper, we investigate a model where a defender and an attacker simultaneously and repeatedly adjust the defenses and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6