<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64acaa70-eefe-4f23-832b-ffc5b79fc2b3"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
[Burch 06] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02d99a89-4f88-42d6-b846-3413c29b7f3d"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro>
[CERT 06] CERT. Managed String Library
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f06d82c3-045b-4c2d-ba3c-f72e352afda0"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
[Graf 03] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3a55023-8916-46c0-b325-c45c6d103d00"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro>
[Haddad 05] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." Linux World Magazine, November, 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33edcd59-7489-46d1-b69f-1b95dd244655"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
[Hatton 04] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7a67e87-4d3c-4918-8c5f-ef503069c5ef"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro>
[ilja 06] ilja. "readlink abuse
." ilja's blog, August 13, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d4b44ac-eb9f-4339-8b82-cf943d6111ee"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3a02c8e-158b-4eb9-b2f0-77ecd5d97f72"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2e7c640-5512-422a-9140-cac98ee10f57"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00dfda17-7feb-4ca5-9571-982ef4ae43ca"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro>
[Klein 02] Klein, Jack. Bullet Proof Integer Input Using strtol(). http://home.att.net/~jackklein/c/code/strtol.html
(2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ab32f6e-3e1b-434b-91d1-bc3d729f4c2e"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
[mercy] mercy. Exploiting Uninitialized Data. http://www.felinemenace.org/papers/UBehavior.zip
(January 2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="191b9f0d-b34c-46e1-9516-277badf7cdd2"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5499fba-ccfc-49d5-a641-d8d08cc52007"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
[NASA-GB-1740.13] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0df3a182-5482-40cc-9b85-d5ebb7f6b8f2"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset (SRD).See http://samate.nist.gov/SRD/srdFiles/![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bfa779f-3f2f-4073-a2ce-7f6bd34d8b92"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro>
[Open Group 97] The Open Group. The Single UNIX ® Specification, Version 2
(1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00f565b3-1e25-4f91-92ba-ad925cf54094"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>
[Open Group 04] The Open Group. The Open Group Base Specifications Issue 6
, IEEE Std 1003.1, 2004 Edition (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90701102-e1dd-4a33-ac84-ecb6e4018207"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5deaedf6-041a-496f-ada4-131d3f548d87"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
[Plum 91] Thomas Plum, Dan Saks. C++ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="170baa40-f629-42c7-aee5-7da8f3a97612"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36958cea-fb42-429a-82e4-89afda1f315e"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
[Seacord 05a] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See http://www.cert.org/books/secure-coding
for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="525b03f5-3f35-4d94-b9c3-3a8db65a4f6d"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
[Seacord 05b] Seacord, R. Managed String Library for C. C/C++ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9153dd1c-b1ec-415d-9f2b-f0790659959e"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Summit, Steve. C Programming FAQs: Frequently Asked Questions. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d0d31f2-d483-4e1d-a561-50b36f515094"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
[Summit 05] Summit, Steve. comp.lang.c Frequently Asked Questions. http://c-faq.com/
(2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9763245-9e43-49e6-9923-bc412bab0c61"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>
[Viega 03] Viega, John & Messier, Matt. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6aa122b5-cdf2-4a57-8351-eafd20df42c2"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.