Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,199,010 papers from all fields of science
Search
Sign In
Create Free Account
Return-to-libc attack
Known as:
Ret-into-libc
, Return-to-libc
, Ret2libc
Expand
A “return-to-libc” attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Address space layout randomization
Buffer overflow
Buffer overflow protection
Call stack
Expand
Broader (1)
C standard library
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Ethnic Violence, Local Security and Return Migration: Enclave communities in Kosovo
S. Joireman
2017
Corpus ID: 158910327
Forced migration has become commonplace in the international political landscape. In 2015, 60 million people were displaced by…
Expand
2017
2017
Notched anti-podal Vivaldi antenna for biomedical applications
A. Alkhaibari
,
A. Sheta
,
I. Elshafiey
International Conference on Modeling, Simulation…
2017
Corpus ID: 44224031
Vivaldi antenna provides ultra-wideband (UWB) performance that makes it attractive for several applications. In this paper, a…
Expand
Review
2016
Review
2016
Rural Migrants : On the Fringe of the City , a Bridge to the Countryside Return Migration , Occupational Change , and Self-Employment The Case of Wuwei County
Hui Xu
2016
Corpus ID: 145029827
After two decades of rural-to-urban labour exodus, an increasing trend of urban-to-rural labour counterflow has also occurred in…
Expand
2016
2016
Bayesian Strategy for Improved Forecasts of the Equity Premium Siddhartha Chib
Xiaming Zeng
2016
Corpus ID: 160028910
In this paper we develop an easily implemented Bayesian strategy for improved forecasts of the market excess returns. This…
Expand
2015
2015
An effective behavior-based Android malware detection system
S. Zou
,
Jing Zhang
,
Xiaodong Lin
Secur. Commun. Networks
2015
Corpus ID: 206465022
With the rapid growth of Android applications and malware, it has become a challenge to distinguish malware from a huge number of…
Expand
Review
2011
Review
2011
Intra-EU Labour Migration: Flows, Effects and Policy Responses
Béla Galgóczi
,
J. Leschke
,
A. Watt
2011
Corpus ID: 154342436
This working paper is an update of the 2009/3 ETUI Working Paper that was itself an abridged and revised version of the…
Expand
2011
2011
OS DETERMINANTES DA MIGRAÇÃO E DAMIGRAÇÃO DE RETORNO INTERMUNICIPAL NO BRASIL
Wellington Ribeiro Justo
,
G. Martins
,
Renato de Alencar Ferreira
,
Cícero Francisco de Lima
2011
Corpus ID: 128429500
The migration has been a research theme quite especially studied in the literature in the last years and with more emphasis…
Expand
2010
2010
Loop finder analysis for analog circuits
G. Fang
,
R. Burt
,
Ning Dong
IEEE Custom Integrated Circuits Conference
2010
Corpus ID: 18385180
The loop finder (LF) analysis is a newly developed method for automatic loop identification and full chip stability analysis. It…
Expand
2006
2006
Foreign Code Detection on the Windows/X86 Platform
Susanta Nanda
,
Wei Li
,
L. Lam
,
T. Chiueh
Asia-Pacific Computer Systems Architecture…
2006
Corpus ID: 573573
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to "lock down…
Expand
1991
1991
Methods for evaluating the predictive accuracy of structural dynamic models
T. Hasselman
,
J. Chrostowski
1991
Corpus ID: 60581620
Modeling uncertainty is defined in terms of the difference between predicted and measured eigenvalues and eigenvectors. Data…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE