Skip to search formSkip to main contentSkip to account menu

Return-to-libc attack

Known as: Ret-into-libc, Return-to-libc, Ret2libc 
A “return-to-libc” attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Forced migration has become commonplace in the international political landscape. In 2015, 60 million people were displaced by… 
2017
2017
Vivaldi antenna provides ultra-wideband (UWB) performance that makes it attractive for several applications. In this paper, a… 
Review
2016
Review
2016
  • Hui Xu
  • 2016
  • Corpus ID: 145029827
After two decades of rural-to-urban labour exodus, an increasing trend of urban-to-rural labour counterflow has also occurred in… 
2016
2016
In this paper we develop an easily implemented Bayesian strategy for improved forecasts of the market excess returns. This… 
2015
2015
With the rapid growth of Android applications and malware, it has become a challenge to distinguish malware from a huge number of… 
Review
2011
Review
2011
This working paper is an update of the 2009/3 ETUI Working Paper that was itself an abridged and revised version of the… 
2011
2011
The migration has been a research theme quite especially studied in the literature in the last years and with more emphasis… 
2010
2010
The loop finder (LF) analysis is a newly developed method for automatic loop identification and full chip stability analysis. It… 
2006
2006
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to "lock down… 
1991
1991
Modeling uncertainty is defined in terms of the difference between predicted and measured eigenvalues and eigenvectors. Data…