1. CERT Vulnerability Note VU#282403 (September 2002),
http://www.kb.cert.org/vuls/id/282403
2. Acharya, A., Raje, M.: Mapbox: Using parameterized behavior classes to confine applications. In: Proceedings of the 9th USENIX Security Symposium, August 2000, pp. 1–17 (2000)
3. Aleph One. Smashing the stack for fun and profit. Phrack, 7(49) (1996)
4. Alexandrov, A., Kmiec, P., Schauser, K.: Consh: A confined execution environment for internet computations (December 1998)
5. Anley, C.: Advanced SQL Injectio. In: SQL Server Applications (2002),
http://www.nextgenss.com/papers/advanced_sql_injection.pdf