Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Printf format string

Known as: Printf(), Placeholder (Computing), %25s (printf) 
Printf format string (of which "printf" stands for "print formatted") refers to a control parameter used by a class of functions in the string… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
 
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.4
  • figure 2.5
Is this relevant?
2012
2012
A variety of code clone detection methods have been proposed before now. However, only a small part of them is widely used… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Format string vulnerabilities occur when programmers pass externally supplied data to a printf function (or similar) as, or as… Expand
Is this relevant?
2005
2005
We propose preventing format-string attacks with a combination of static dataflow analysis and dynamic white-lists of safe… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In June 2000, a major new class of vulnerabilities called "format bugs" was discovered when an vulnerability in WU-FTP appeared… Expand
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a new system for automatically detecting format string security vulnerabilities in C programs using a constraint-based… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1994
Highly Cited
1994
utomated Program understanding can be viewed as the process of automatically extracting design knowledge from source code. Past… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Modern research in atmospheric chemistry requires highly sensitive techniques for the measurement of concentrations of free… Expand
Is this relevant?