<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="770a0c93-723e-4c50-835a-df43677d6859"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
[Burch 06] Burch, H.; Long, F.; & Seacord, R. Specifications for Managed Strings
(CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e20fc8c-0231-4f5e-ae60-71064cb05284"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro>
[CERT 06] CERT. Managed String Library
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fd14c83-6138-4429-b133-584b6c978913"><ac:parameter ac:name="">Dewhurst 02</ac:parameter></ac:structured-macro>
[Dewhurst 02] Dewhurst, Stephen C. C++ Gotchas: Avoiding Common Problems in Coding and Design. Boston, MA: Addison-Wesley Professional, 2002.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6d05099-22cf-475c-b724-b63537d11135"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>
[FSF 05] Free Software Foundation. GCC online documentation.
(2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c211d8b9-fbbf-4ec6-aab5-1edc0c86e979"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
[Graff 03] Graff, Mark G. & Van Wyk, Kenneth R. Secure Coding: Principles and Practices. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b86e9a62-3c69-47c9-91ad-dec590104b7b"><ac:parameter ac:name="">Griffiths 06</ac:parameter></ac:structured-macro>
[Griffiths 06] Griffiths, Andrew. "Clutching at straws: When you can shift the stack pointer
."
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80fae3fe-3648-4e19-bb79-7968f6597cee"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro>
[Haddad 05] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." Linux World Magazine, November, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a7eb565-5856-4a80-91b5-6bf94feb349f"><ac:parameter ac:name="">Hatton 95</ac:parameter></ac:structured-macro>
[Hatton 95] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York, NY: McGraw-Hill Book Company, 1995 (ISBN 0-07-707640-0).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35da2751-f661-4181-a223-0b84df910400"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro>
[ilja 06] ilja. "readlink abuse
." ilja's blog, August 13, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7a97954-e652-4361-aa39-e29282d76647"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42330682-af7a-4fa8-8495-1bb14eeb85d8"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="502f6064-b339-4536-9bdb-d219b001a3e7"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan, B. W. & Ritchie, D. M. The C Programming Language, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37570f90-18c6-421a-ac53-e301bc0dd6e8"><ac:parameter ac:name="">Kettle 03</ac:parameter></ac:structured-macro>
[Kettlewell 03] Kettlewell, Richard. Inline Functions In C
(March 2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e5f066f-a6dd-41d7-b28d-c9c53c7b0605"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro>
[Klein 02] Klein, Jack. Bullet Proof Integer Input Using strtol()
(2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21cde0e7-dd54-44b9-9712-1493eecb6ee2"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
[mercy] mercy. Exploiting Uninitialized Data
(January 2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbb001a5-abce-41df-93a2-89eda2c7891b"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MIRA Limited. "MISRA C
: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b6f2111-b823-43e0-bf72-d8e280f27797"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
[NASA-GB-1740.13] NASA Glenn Research Center, Office of Safety Assurance Technologies. NASA Software Safety Guidebook
(NASA-GB-1740.13).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35d36141-2f75-4e3c-ae62-ac986840ef43"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cb1139e-c865-4b9e-9fdd-6cee3a15685c"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro>
[Open Group 97] The Open Group. The Single UNIX ® Specification, Version 2
(1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e836c0e8-2f4c-43fb-98b1-53fd897f3ab2"><ac:parameter ac:name="">Open Group 04a</ac:parameter></ac:structured-macro>
[Open Group 04a] The Open Group. "readlink
." The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58369854-8564-4232-b748-9911b8d6baad"><ac:parameter ac:name="">Open Group 04b</ac:parameter></ac:structured-macro>
[Open Group 04b] The Open Group. "realpath
." The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_ (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1c2b0fe-aefe-4c70-81dd-86c1d16d0602"><ac:parameter ac:name="">Open Group 04c</ac:parameter></ac:structured-macro>
[Open Group 04c] The Open Group. "open
." The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_ (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1aa0aea2-af73-4c7c-9358-41e826bbb236"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines, 2nd ed. Kamuela, HI: Plum Hall, Inc., 1989 (ISBN 0911537074).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c130ea34-8e82-42ca-a691-4e4a169f213a"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
[Plum 91] Plum, Thomas. C++ Programming. Kamuela, HI: Plum Hall, Inc., 1991 (ISBN 0911537104).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69b2c8e4-034f-4594-8ba3-6d12cb0e7335"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>
[Saks 99] Dan Saks. const T vs.T const. Embedded Systems Programming. Pg. 13-16. February 1999. http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dea068d0-cf3f-4856-8e0f-481b8d2c6151"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c62a0938-000a-450f-aade-8c0bcaf5500f"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
[Seacord 05a] Seacord, R. Secure Coding in C and C++. Boston, MA: Addison-Wesley, 2005. See http://www.cert.org/books/secure-coding
for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2479e5a5-d276-43b7-908c-a0bb05b4b1c9"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
[Seacord 05b] Seacord, R. "Managed String Library for C, C/C++." Users Journal 23, 10 (October 2005): 30-34.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0d966a1-3c4d-41bb-aaa9-292b7e779900"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Summit, Steve. C Programming FAQs: Frequently Asked Questions. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b770e3f8-c9fb-4a3b-9cc8-7395879ffbab"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
[Summit 05] Summit, Steve. comp.lang.c Frequently Asked Questions
(2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4859458-f549-4ba8-bc11-8ecd13d86145"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>
[Viega 03] Viega, John & Messier, Matt. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ffeaa5f-5362-4acc-aa1a-36e4a891b5c3"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Warren, Henry S. Hacker's Delight. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).