1. M. Howard, S. Lipner: The Security Development Lifecycle (Microsoft Press, Redmond, Washington 2006)
2. E.H. Spafford: The Internet worm program: An analysis, SIGCOMM Comput. Commun. Rev. 19(1), 17–57 (1989)
3. Intel Corporation: Intel IA-32 Architecture, Software Developer's Manual, Volumes 1–3, available at http://developer.intel.com/design/Pentium/documentation.htm (2007)
4. C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, J. Lokier: FormatGuard: Automatic protection from printf format string vulnerabilities, Proc. 10th USENIX Security Symp. (2001) pp. 191–200
5. D. Brumley, T. Chiueh, R. Johnson, H. Lin, D. Song: Efficient and accurate detection of integer-based attacks, Proc. 14th Annual Network and Distributed System Security Symp. (NDSS'07) (2007)