[1] AlphaOne. Smashing The Stack For Fun And Profit[EB/OL]. (1996-11-08)[2018-08-11]. http://phrack.org/issues/49/14.html
[2] Matt Conover. w00w00 on Heap Overflows[EB/OL]. (2002-05-06)[2018-08-11]. http://www.w00w00.org/files/articles/heaptut.txt
[3] The OWASP Foundation. Double Free[EB/OL]. (2014-06-24)[2018-08-11]. https://www.owasp.org/index.php/Double_Free
[4] CTF Wiki. Integer overflow[EB/OL]. (2018-04-26)[2018-08-11]. https://ctf-wiki.github.io/ctf-wiki/pwn/integeroverflow/intof/
[5] 赵世斌,周天阳,朱俊虎,等. 竞态漏洞检测方法综述[J]. 计算机工程与应用, 2018, 54(4): 1-10
[6] Wikipedia. NX Bit[EB/OL]. (2014-08-06)[2018-08-11]. https://en.wikipedia.org/wiki/NX_bit
[7] Shacham H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)[C].//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 552-561
[8] Phantasmagoria P. The Malloc Maleficarum: Glibc Malloc Exploitation Techniques[EB/OL]. (2005-10-12)[2018-08-11]. https://packetstormsecurity.com/files/40638/MallocMaleficarum.txt
[9] Jonathan A. Dangling Pointer:Smashing the pointer for fun and Profit[EB/OL]. 2007[2018-08-11]. http://www.blackhat.com/presentations/bh-usa-07/Afek/Whitepaper/bh-usa-07-afek-WP.pdf
[10]TESO Security. telnetd exploit code [CP/OL]. (2001-06-09)[2018-08-11]. http://seclists.org/bugtraq/2001/Jul/533
[11] Wikipedia. Address Space Layout Randomization[EB/OL]. (2016-12-02)[2018-08-11]. https://en.wikipedia.org/wiki/Address_space_layout_randomization
[12] Wikipedia. Position Independent Code[EB/OL]. (2015-10-30)[2018-08-11]. https://en.wikipedia.org/wiki/Position-independent_code
[13]Wikipedia. Relocation[EB/OL]. (2016-02-13)[2018-08-11]. https://en.wikipedia.org/wiki/Relocation_(computing)
[14]Wikipedia. Buffer Overflow Protection[EB/OL]. (2016-04-23)[2018-08-12]. https://en.wikipedia.org/wiki/Buffer_overflow_protection
[15]Jelinek J. Object size checking to prevent(some) buffer overflows[EB/OL]. (2004-09-21)[2018-08-12]. http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html
[16]Bosman E, Bos H. Framing Signals - A Return to Portable Shellcode[C]// Security and Privacy. IEEE, 2014:243-258
[17] Bittau A, Belay A, Mashtizadeh A, et al. Hacking Blind[J]. 2014:227-242
[18]Markus G. DEP&ROP: Modern Binary Exploitation[EB/OL]. (2015-10-03)[2018-08-13]. http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/11/07_lecture.pdf
[19]Federico A D, Cama A, Yan S, et al. How the ELF ruined Christmas[C]// Usenix Conf on Security Symposium. USENIX Association, 2015:643-658