1Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01.
2McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacquainted with the Single Biggest Threat to Software Security.Reliable Software Technologies,2000-03-01.