...
| Anchor | ||||
|---|---|---|---|---|
|
[Jack 2007] Jack, Barnaby. Vector Rewrite Attack. May rewrite attack: Exploitable NULL pointer vulnerabilities
on ARM and XScale architectures. In CanSecWest 2007, Vancouver,
BC, Canada, April 2007.
| Anchor | ||||
|---|---|---|---|---|
|
[Jones 2004] Jones, Nigel. Learn a New Trick with the offsetof() Macro. Embedded Systems Programming, March 2004.
...
| Anchor | ||||
|---|---|---|---|---|
|
[NASA-GB-1740.13] NASA Glenn Research Center, Office of Safety Assurance Technologies. NASA Software Safety Guidebook (NASA-GB-1740.13).
| Anchor | ||||
|---|---|---|---|---|
|
[Myers, 2001] Meyers, Randy. The New C: X Macros. Dr. Dobbs. May 01, 2001
...
| Anchor | ||||
|---|---|---|---|---|
|
[Saks 2007b] Saks, Dan. "Bail, Return, Jump, or . . . Throw?" Embedded Systems Design, March 2007.
...
| Anchor | ||||
|---|---|---|---|---|
|
[Zalewski 2001] Zalewski, Michal. Delivering Signals for Fun and Profit: Understanding, Exploiting and Preventing Signal-Handling Related Vulnerabilities . Bindview Corporation, May 2001.
...