1Kyung-Suk Lhee and Steve J.Chapin.Buffer overflow and format string overflow vulnerabilities[J].Software:Practice and Experience,2003,22(5):423-460. 被引量:1
2M.Eichin and J.Rochlis.With microscope and tweezers:An analysis of the internet virus of November 1988.In Proceedings of the 1989IEEE Computer Society Symposium on Security and Privacy,1989. 被引量:1
3Jingmin Zhou,How Many Ways to Defeat Buffer Overflow,Department of Computer Science University of California,Davis. 被引量:1