Memory corruption

Known as: Computer memory hacking, Heap corruption 
Memory corruption occurs in a computer program when the contents of a memory location are unintentionally modified due to programming errors; this is… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1986-2016
0102019862016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer… (More)
  • figure 1
  • table I
  • table II
Is this relevant?
2008
2008
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they… (More)
  • figure 1
Is this relevant?
2007
2007
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (<i>ARray CHeckER</i>) a static… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2003
2003
This article discusses the tools that Ada offers to deal with dynamic memory problems. The article shows how the storage pools… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?