共 7 条
[1]
FX of Phenoelit.Bug hunting. http://www.phenoelit.de/stuff/Bugs.pdf . 2008
[2]
Essential COM. BOX D. . 1997
[3]
Automatedvulnerability analysis. SPARKS S,EMBLETON S,CUNNINGHAM R,et al. Computer Security Applications Confer-ence,2007.ACSAC 2007.Twenty-Third Annual . 2007
[4]
The art of software securityassessment:Identifying and preventing software vulnerabilities. DOWD M,MCDONALD J,SCHUH J. . 2006
[5]
Python programming on Win 3 2. HAMMOND M,ROBINSON A. http://download.csdn.net/source/203224 . 2008
[6]
FUZZING brute force vulnera-bility discovery. SUTTON M,GREENE A,AMINI P. . 2007
[7]
ActiveX-Active Exploitation. Warlord. packetstormsecurity.org/papers/attack/activex.pdf . 2008