2Kyung-Suk Lhee and Steve J.Chapin.Buffer overflow and format string overflow vulnerabilities[J].Software:Practice and Experience,2003,22(5):423-460.
3M.Eichin and J.Rochlis.With microscope and tweezers:An analysis of the internet virus of November 1988.In Proceedings of the 1989IEEE Computer Society Symposium on Security and Privacy,1989.
4Jingmin Zhou,How Many Ways to Defeat Buffer Overflow,Department of Computer Science University of California,Davis.
5张观录.基于windows平台的软件安全漏洞发掘技术研究[D].四川:电子科技大学,2007.
6Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(05): 192-203.