...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
| [Dewhurst 022002] | Gotcha #39, "Casting Incomplete Types" |
| [ISO/IEC 14882-2014] | Subclause 4.10, "Pointer Conversions" |
| [Sutter 002000] | "Compiler Firewalls and the Pimpl Idiom" |
...