How security flaws work: The buffer overflow