Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Memory corruption

Known as: Computer memory hacking, Heap corruption 
Memory corruption occurs in a computer program when the contents of a memory location are unintentionally modified due to programming errors; this is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
With more IoT devices entering the consumer market, it becomes imperative to detect their security vulnerabilities before an… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer… Expand
  • figure 1
  • table I
  • table II
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Economic development and bureaucratic corruption are determined jointly in a dynamic general equilibrium model of growth, bribery… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Abstract Organizational corruption imposes a steep cost on society, easily dwarfing that of street crime. We examine how… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
SUMMARY The paper distinguishes between collusive and non-collusive corruption in the forestry sector and analyses their… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
There appears to be significant diversity in the incidence of bureaucratic corruption across countries at different stages of… Expand
Is this relevant?