6[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01 被引量:1
7[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01 被引量:1
8[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08 被引量:1