The document discusses software attacks that can occur at runtime, including buffer overflows, return-oriented programming, and their potential uses and countermeasures. It provides an overview of common software attacks according to the OWASP Top 10 list and describes buffer overflow attacks and return-oriented programming attacks in detail through examples and diagrams. Potential targets of software attacks mentioned include internet applications, e-voting, banking, and TV decoders.