Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Integer overflow

Known as: Integer attack, Integer attacks, Overflow 
In computer programming, an integer overflow occurs when an arithmetic operation attempts to create a numeric value that is too large to be… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Integer overflows have threatened software applications for decades. Thus, in this paper, we propose a novel technique to provide… Expand
2014
2014
We present solutions to the three challenges of the VerifyThis competition held at the 18th FM symposium in August 2012. These… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 10
  • figure 9
2014
2014
We present a new technique and system, DIODE, for auto- matically generating inputs that trigger overflows at memory allocation… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Highly Cited
2012
Highly Cited
2012
Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable… Expand
  • table I
  • figure 1
  • table II
  • table III
  • table IV
2012
2012
Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable… Expand
2010
2010
This paper presents an automatic testing method, DAIDT (dynamic automatic integer-overflow detection and testing), for finding… Expand
  • table 1
Highly Cited
2009
Highly Cited
2009
Recently, integer bugs, including integer overflow, width conversion, and signed/unsigned conversion errors, have risen to become… Expand
  • figure 2
  • figure 6
  • figure 4
  • figure 7
  • figure 8
Highly Cited
2009
Highly Cited
2009
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present… Expand
  • table 1
  • figure 1
  • figure 4
  • figure 3
  • figure 5
2007
2007
Control-hijacking attacks exploit vulnerabilities in network services to take control of them and eventually their underlying… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
1994
1994
The feasibility of whole nerve recordings from the hypoglossal (HG) nerve is demonstrated in acute cats using the spiral nerve… Expand
  • figure I
  • figure 2
  • figure 5
  • figure 3
  • figure 4