...
| Anchor | ||||
|---|---|---|---|---|
|
[Jack 2007] Jack, Barnaby. Vector Rewrite Attack. May rewrite attack: Exploitable NULL pointer vulnerabilities
on ARM and XScale architectures. In CanSecWest 2007, Vancouver,
BC, Canada, April 2007.
| Anchor | ||||
|---|---|---|---|---|
|
[Jones 2004] Jones, Nigel. Learn a New Trick with the offsetof() Macro. Embedded Systems Programming, March 2004.
...
| Anchor | ||||
|---|---|---|---|---|
|
[Mercy 2006] Mercy. Exploiting Uninitialized Data . January 2006.
[Myers 2001] Meyers, Randy. The New C: X Macros. Dr. Dobbs. May 01, 2001
| Anchor | ||||
|---|---|---|---|---|
|
[Meyers 2004] Meyers, Randy. Limited size_t WG14 N1080. September 2004.
...
| Anchor | ||||
|---|---|---|---|---|
|
[NASA-GB-1740.13] NASA Glenn Research Center, Office of Safety Assurance Technologies. NASA Software Safety Guidebook (NASA-GB-1740.13).
| Anchor | ||||
|---|---|---|---|---|
|
[Myers, 2001] Meyers, Randy. The New C: X Macros. Dr. Dobbs. May 01, 2001
...
| Anchor | ||||
|---|---|---|---|---|
|
[Saks 2007b] Saks, Dan. "Bail, Return, Jump, or . . . Throw?" Embedded Systems Design, March 2007.
...