Buffer overflow attacks and defenses for the vulnerability of the decade
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
The Buffer Overflow Attack and How to Solve Buffer Overflow in Recent Research