5[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01
6[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01
7[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08