Uncontrolled format string

Known as: Format string bug, Uncontrolled, Format string attacks 
Uncontrolled format string is a type of software vulnerability discovered around 1989 that can be used in security exploits. Previously thought… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Inverse problems in statistical physics are motivated by the challenges of ‘big data’ in different fields, in particular high… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table I
Is this relevant?
Review
2017
Review
2017
We provide a comprehensive overview of mathematical models and analytical techniques for millimeter wave (mmWave) cellular… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Feature trajectories have shown to be efficient for representing videos. Typically, they are extracted using the KLT tracker or… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Review
2009
Review
2009
In contrast to normal differentiated cells, which rely primarily on mitochondrial oxidative phosphorylation to generate the… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper investigates an application of mobile sensing: detecting and reporting the surface conditions of roads. We describe a… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We present a real-time algorithm which can recover the 3D trajectory of a monocular camera, moving rapidly through a previously… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper examines user-generated metadata as implemented and applied in two web services designed to share and organize digital… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Cyclone is a safe dialect of C. It has been designed from the ground up to prevent the buffer overflows, format string attacks… (More)
  • table 3
  • table 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
keep cells under control. Just as a car’s brakes regulate its speed, properly functioning tumour-suppressor genes act as brakes… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
AbstmctA direct application of commonly used synchronization primitives such as semaphores, monitors, or the Ada rendezvous can… (More)
Is this relevant?