Buffer Overflows: A Symphony Of Exploitation