1. Common vulnerabilities and exposures (CVE).
http://cve.mitre.org/
2. Christey, S., Martin, R.A.: Vulnerability Type Distributions in CVE, May 2007.
http://cve.mitre.org/docs/vuln-trends/vuln-trends.pdf
3. CWE-680: IO2BO vulnerabilities.
http://cwe.mitre.org/data/definitions/680.html
4. Lecture Notes in Computer Science;C Zhang,2010
5. Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.K.: Non-control-data attacks are realistic threats. In: Proceedings of the 14th Conference on USENIX Security Symposium, p. 12 (2005)