4Kyung-Suk Lhee and Steve J.Chapin.Buffer overflow and format string overflow vulnerabilities[J].Software:Practice and Experience,2003,22(5):423-460.
5M.Eichin and J.Rochlis.With microscope and tweezers:An analysis of the internet virus of November 1988.In Proceedings of the 1989IEEE Computer Society Symposium on Security and Privacy,1989.
6Jingmin Zhou,How Many Ways to Defeat Buffer Overflow,Department of Computer Science University of California,Davis.
7Johnson R,Wagner D. Finding user/kemel pointer bugs with typeinference//Proceedings of 2004 USENIX Security Symposium, San Diego,CA,USA,2004: 119-134.
8Ashcraft K, Engler D. Using programmer-written compilerextensions to catch security holes//Proceedings of 2002 IEEE Symposium onSecurity and Privacy, Oakland, CA, USA, 2002 ; 143—159.