Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,134,368 papers from all fields of science
Search
Sign In
Create Free Account
Integer overflow
Known as:
Integer attack
, Integer attacks
, Overflow
In computer programming, an integer overflow occurs when an arithmetic operation attempts to create a numeric value that is too large to be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Ada
Arbitrary-precision arithmetic
Arithmetic underflow
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Predicting integer overflow through static integer operation attributes
Meng Qingkun
,
Wen Shameng
,
Feng Chao
,
Tang Chaojing
International Conference on Computer Science and…
2016
Corpus ID: 8582498
Integer overflow vulnerability is very difficult to locate and patch. From experience speaking the more complicate the integer…
Expand
2015
2015
Improving Accuracy of Static Integer Overflow Detection in Binary
Yang Zhang
,
Xiaoshan Sun
,
+4 authors
D. Feng
International Symposium on Recent Advances in…
2015
Corpus ID: 44914022
Integer overflow presents a major source of security threats to information systems. However, current solutions are less…
Expand
2014
2014
A Taint Based Smart Fuzzing Approach for Integer Overflow Vulnerability Detection
Jun Cai
,
Peng Zou
,
Jinxin Ma
,
Jun He
2014
Corpus ID: 28403426
-Fuzzing is one of the most commonly used methods to detect software vulnerabilities which are one major cause of information…
Expand
2012
2012
Monitoring of Aging Software Systems Affected by Integer Overflows
Domenico Cotroneo
,
R. Natella
IEEE 23rd International Symposium on Software…
2012
Corpus ID: 1671070
Numerical aging-related bugs, which can manifest themselves as the accumulation of floating-point errors and the overflow of…
Expand
2010
2010
High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs: High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
Xicheng Lu
,
Gen Li
,
Kai Lu
,
Y. Zhang
2010
Corpus ID: 62767656
This paper presents an automatic testing method, DAIDT (dynamic automatic integer-overflow detection and testing), for finding…
Expand
2010
2010
High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
L. Xi
2010
Corpus ID: 63585631
This paper presents an automatic testing method,DAIDT(dynamic automatic integer-overflow detection and testing),for finding…
Expand
2009
2009
Mutation-Based Testing of Integer Overflow Vulnerabilities
Fanping Zeng
,
Liangliang Mao
,
Zhide Chen
,
Qing Cao
International Conference on Wireless…
2009
Corpus ID: 6137527
Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer…
Expand
Review
2008
Review
2008
Classes of Vulnerabilities and Attacks
P. Meunier
2008
Corpus ID: 18801071
In the first part of this article, popular vulnerability and attack types used in books, vulnerability disclosures, and databases…
Expand
1994
1994
Whole nerve recordings with the spiral nerve cuff electrode
M. Sahin
,
D. Durand
,
M. Haxhiu
Proceedings of 16th Annual International…
1994
Corpus ID: 16395518
The feasibility of whole nerve recordings from the hypoglossal (HG) nerve is demonstrated in acute cats using the spiral nerve…
Expand
1977
1977
On the use of integer arithmetic to achieve confirmably correct computation
P. M. Neely
Software, Practice & Experience
1977
Corpus ID: 45938263
An example is provided from biostatistics to show that transformation to a unit normal deviate can be inadvisable. This is used…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE