1Kyung-Suk Lhee and Steve J.Chapin.Buffer overflow and format string overflow vulnerabilities[J].Software:Practice and Experience,2003,22(5):423-460.
2M.Eichin and J.Rochlis.With microscope and tweezers:An analysis of the internet virus of November 1988.In Proceedings of the 1989IEEE Computer Society Symposium on Security and Privacy,1989.
3Jingmin Zhou,How Many Ways to Defeat Buffer Overflow,Department of Computer Science University of California,Davis.