<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cffd79a-b59b-4bf0-ac2c-8db62c10a1f7"><ac:parameter ac:name="">Apple 06</ac:parameter></ac:structured-macro> \[Apple 06\] Apple, Inc. [_Secure Coding Guide_|http://developer.apple.com/documentation/Security/Conceptual/SecureCodingGuide/SecureCodingGuide.pdf], May 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="377ed1f8-61d5-44fe-8e93-d7deb3706f59"><ac:parameter ac:name="">Banahan 03</ac:parameter></ac:structured-macro> \[Banahan 03\] Banahan, Mike. [The C Book|http://www.phy.duke.edu/~rgb/General/c_book/c_book/index.html], 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99cb6718-1f1f-489c-9d20-c222f61bca0a"><ac:parameter ac:name="">Bryant 03</ac:parameter></ac:structured-macro> \[Bryant 03\] Bryant, Randy; O'Halloran, David. _Computer Systems: A Programmer's Perspective_. Prentice Hall, 2003. ISBN 0-13-034074-X. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6defc81d-54a2-4515-a050-3f827e04112b"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Burch, H.; Long, F.; & Seacord, R. [_Specifications for Managed Strings_|http://www.sei.cmu.edu/publications/documents/06.reports/06tr006.html] (CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61e1bd51-a59a-4e7a-a077-d9371ed2b03f"><ac:parameter ac:name="">Callaghan 95</ac:parameter></ac:structured-macro> \[Callaghan 95\] Callaghan, B.; Pawlowski, B.; & Staubach, P. [IETF RFC 1813 NFS Version 3 Protocol Specification|http://www.ietf.org/rfc/rfc1813.txt], June 1995. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d2fb06d-ca24-4d5f-a7ea-69cc9946c937"><ac:parameter ac:name="">CERT 06a</ac:parameter></ac:structured-macro> \[CERT 06a\] CERT/CC. [CERT/CC Statistics 1988-2006|http://www.cert.org/stats/cert_stats.html]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0ff1632-1158-4e7c-82e4-a0f33106f3ef"><ac:parameter ac:name="">CERT 06b</ac:parameter></ac:structured-macro> \[CERT 06b\] CERT/CC. US-CERT's [Technical Cyber Security Alerts|http://www.us-cert.gov/cas/techalerts/index.html]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12ec26f3-9eae-49e4-98d0-762996a0dc79"><ac:parameter ac:name="">CERT 06c</ac:parameter></ac:structured-macro> \[CERT 06c\] CERT/CC. [Secure Coding|http://www.cert.org/secure-coding/] web site. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e47562a1-163f-4e22-8e5b-2b07e0497cea"><ac:parameter ac:name="">Corfield 93</ac:parameter></ac:structured-macro> \[Corfield 93\] Corfield, Sean A. "[http://www.open-std.org/jtc1/sc22/wg21/docs/papers/1993/N0389.asc]" 24 November 1993. <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11ddf6a6-1245-4e67-a43e-49b9e7fac9fb"><ac:parameter ac:name="">Coverity 07</ac:parameter></ac:structured-macro> \[Coverity 07\] Coverity Prevent User's Manual (3.3.0), 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7b63be3-b9c2-44fb-a1fa-70e82edb8dd7"><ac:parameter ac:name="">Dewhurst 02</ac:parameter></ac:structured-macro> \[Dewhurst 02\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="addeef79-db18-47c2-85bf-26b2b558f8e9"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro> \[Dewhurst 03\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b732bbdf-4c53-4cfb-9c88-77f14da87f0c"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro> \[Dewhurst 05\] Dewhurst, Stephen C. _C+\+ Common Knowledge: Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd8d4aa7-7c28-4bda-9055-b1d5b0a4caa1"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 06\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9b29517-b431-44a3-aa67-301a60ba0844"><ac:parameter ac:name="">Dowd 06</ac:parameter></ac:structured-macro> \[Dowd 06\] Dowd, M.; McDonald, J.; & Schuh, J. _The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities_. Boston, MA: Addison-Wesley, 2006. See [http://taossa.com] for updates and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82152004-bc13-4cf3-b42d-018e9cfc69f1"><ac:parameter ac:name="">Drepper 06</ac:parameter></ac:structured-macro> \[Drepper 06\] Drepper, Ulrich. [Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong)|http://people.redhat.com/drepper/defprogramming.pdf], May 3, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d236b483-db06-4a3c-9c75-87d10aeff447"><ac:parameter ac:name="">Finlay 03</ac:parameter></ac:structured-macro> \[Finlay 03\] Finlay, Ian A. CERT Advisory CA-2003-16, [Buffer Overflow in Microsoft RPC|http://www.cert.org/advisories/CA-2003-16.html]. CERT/CC, July 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa5ad55c-967e-495e-a1bb-9e903f501aeb"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro> \[Fortify 06\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0955e00e-5b57-426c-9656-ba2f8b9fe056"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro> \[FSF 05\] Free Software Foundation. [GCC online documentation|http://gcc.gnu.org/onlinedocs], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04e2d78e-da55-4d6a-8b90-aed6c9a61dfe"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro> \[Garfinkel 96\] Simson Garfinkel, Gene Spafford. Practical UNIX & Internet Security. ISBN 1-56592-148-8, 1004 pages. Second Edition, April 1996. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5020a31-5c10-4abf-98a5-ba13ef2163ca"><ac:parameter ac:name="">GNU Pth</ac:parameter></ac:structured-macro> \[GNU Pth\] Engelschall, Ralf S. [GNU Portable Threads|http://www.gnu.org/software/pth/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d10b8b7e-2de0-4f20-a6ea-27ad3ec85400"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94bf5255-add0-4d39-9442-ce218a9c856b"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graff 03\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f261a34-2dfd-48ba-8b81-ab22dabe6a13"><ac:parameter ac:name="">Griffiths 06</ac:parameter></ac:structured-macro> \[Griffiths 06\] Griffiths, Andrew. "[Clutching at straws: When you can shift the stack pointer|http://felinemenace.org/papers/p63-0x0e_Shifting_the_Stack_Pointer.txt]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4db588c8-cb72-46d8-bdf1-4df44fb7f7f5"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ea262d6-b9f7-4cb3-91aa-cb86317302ea"><ac:parameter ac:name="">Hatton 95</ac:parameter></ac:structured-macro> \[Hatton 95\] Hatton, Les. _Safer C: Developing Software for High-Integrity and Safety-Critical Systems_. New York, NY: McGraw-Hill Book Company, 1995 (ISBN 0-07-707640-0). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc697b0-3648-4956-88ae-3df1036ca1d5"><ac:parameter ac:name="">Horton 90</ac:parameter></ac:structured-macro> \[Horton 90\] Mark R. Horton. Portable C software. Prentice-Hall, Inc. Upper Saddle River, NJ, 1990 (ISBN:0-13-868050-7). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="256b1924-8b8f-4586-a0fd-1a5a4565b918"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro> \[Howard 02\] Michael Howard, David C. LeBlanc. [Writing Secure Code, Second Edition|http://www.microsoft.com/mspress/books/5957.aspx] Microsoft Press; 2 Sub edition, December, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b566220-b351-493a-a116-e5bb57c1568b"><ac:parameter ac:name="">HP 03</ac:parameter></ac:structured-macro> \[HP 03\] [Tru64 UNIX: Protecting Your System Against File Name Spoofing Attacks|http://h30097.www3.hp.com/docs/wpapers/spoof_wp/symlink_external.pdf]. Houston, TX: Hewlett-Packard Company, January 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf45f879-9a2c-4d90-a482-9e155a1f5d62"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] _Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA)_, 2nd ed. (IEC 60812). IEC, January 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3ec6502-cb3a-4da5-b3c8-e2faed31c4b1"><ac:parameter ac:name="">IEC 61508 4</ac:parameter></ac:structured-macro> \[IEC 61508-4\] _Functional safety of electrical/electronic/programmable electronic safety-related systems - Part 4: Definitions and abbreviations_, 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06a6dbeb-24b7-4f5f-bc6c-9636c5334bd5"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8eebeb4d-d852-46f8-8c1a-a3dc18d5167b"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro> \[ilja 06\] ilja. "[readlink abuse|http://blogs.23.nu/ilja/stories/12551/]." _ilja's blog_, August 13, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6aa5b4b9-9e2e-4b07-a74a-d244a0cd4742"><ac:parameter ac:name="">ISO/IEC 10646-2003</ac:parameter></ac:structured-macro> \[ISO/IEC 10646:2003\] _Information technology -- Universal Multiple-Octet Coded Character Set (UCS)_ (ISO/IEC 10646:2003). Geneva, Switzerland: International Organization for Standardization, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b23124a-439f-4b14-9d4e-cd3a763899ad"><ac:parameter ac:name="">ISO/IEC 646-1991</ac:parameter></ac:structured-macro> \[ISO/IEC 646-1991\] ISO/IEC. _Information technology: ISO 7-bit coded character set for information interchange_ (ISO/IEC 646-1991). Geneva, Switzerland: International Organization for Standardization, 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="344ef77f-0a91-4e77-ba25-661c093f78b0"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899:1999\] ISO/IEC. _Programming Languages --- C, Second Edition_ (ISO/IEC 9899:1999). Geneva, Switzerland: International Organization for Standardization, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6392256e-c16a-476e-86f6-194aed2c3d94"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro> \[ISO/IEC 14882-2003\] ISO/IEC. _Programming Languages --- C++, Second Edition_ (ISO/IEC 14882-2003). Geneva, Switzerland: International Organization for Standardization, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="882db71f-4b36-4478-aa7b-13179374ce0e"><ac:parameter ac:name="">ISO/IEC 03</ac:parameter></ac:structured-macro> \[ISO/IEC 03\] ISO/IEC. [_Rationale for International Standard --- Programming Languages --- C, Revision 5.10_|http://www.open-std.org/jtc1/sc22/wg14/www/C99RationaleV5.10.pdf]. Geneva, Switzerland: International Organization for Standardization, April 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96154d7c-1e6c-47a9-b3b9-178dc4053239"><ac:parameter ac:name="">ISO/IEC JTC1/SC22/WG11</ac:parameter></ac:structured-macro> \[ISO/IEC JTC1/SC22/WG11\] ISO/IEC. [_Binding Techniques_|http://www.open-std.org/JTC1/SC22/WG11/] (ISO/IEC JTC1/SC22/WG11), 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f1bb1f1-b732-4fa6-9276-a55ff3a262e9"><ac:parameter ac:name="">ISO/IEC TR 24731-1-2007</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-1-2007\] ISO/IEC TR 24731. _Extensions to the C Library, --- Part I: Bounds-checking interfaces_. Geneva, Switzerland: International Organization for Standardization, April 2006. |
anchor:ISO/IEC DTR 24772-2007} \[ISO/IEC DTR 24772-2007\] ISO/IEC TR 24731. [Information Technology ? Programming Languages ? Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use|http://www.aitcnet.org/isai/_NextMeeting/22-OWGV-n-0106/n0106.pdf]. November, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45ec7a45-0d57-448b-92b5-a2ccf8215510"><ac:parameter ac:name="">Jack 07</ac:parameter></ac:structured-macro> \[Jack 07\] Jack, Barnaby. [_Vector Rewrite Attack_|http://www.juniper.net/solutions/literature/white_papers/Vector-Rewrite-Attack.pdf], May 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab108219-a3f8-4ccf-bf1a-0cc9315d74db"><ac:parameter ac:name="">Jones 04</ac:parameter></ac:structured-macro> \[Jones 04\] Jones, Nigel. ["Learn a new trick with the offsetof() macro."|http://www.netrino.com/Articles/OffsetOf/index.php] _Embedded Systems Programming_, March 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d48ba43-3de7-4600-80e1-92f13881a1ce"><ac:parameter ac:name="">Kennaway 00</ac:parameter></ac:structured-macro> \[Kennaway 00\] Kennaway, Kris. [Re: /tmp topic|http://lwn.net/2000/1221/a/sec-tmp.php3], December 2000. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ddea2ca-8e37-4381-8111-b604f0fef476"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan, B. W. & Ritchie, D. M. _The C Programming Language, 2nd ed._ Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b6c5e7e-b160-4fd7-a2a2-29efa3311ae9"><ac:parameter ac:name="">Kettle 02</ac:parameter></ac:structured-macro> \[Kettlewell 02\] Kettlewell, Richard. [_C Language Gotchas_|http://www.greenend.org.uk/rjk/2001/02/cfu.html], February 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89e6300a-4f40-48cf-b39c-f542718e9d63"><ac:parameter ac:name="">Kettle 03</ac:parameter></ac:structured-macro> \[Kettlewell 03\] Kettlewell, Richard. [_Inline Functions In C_|http://www.greenend.org.uk/rjk/2003/03/inline.html], March 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="507974ad-0d37-4e73-99b1-6f4241eae7e7"><ac:parameter ac:name="">Kirch-Prinz 02</ac:parameter></ac:structured-macro> \[Kirch-Prinz 02\] Ulla Kirch-Prinz, Peter Prinz. _C Pocket Reference_. O'Reilly, November 2002, (ISBN: 0-596-00436-2). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b473dd89-9a8b-4cc8-8f21-c9ca6cb16769"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. [_Bullet Proof Integer Input Using strtol()_|http://home.att.net/~jackklein/c/code/strtol.html], 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58c375e5-5438-4432-bb56-13665025dcfd"><ac:parameter ac:name="">Koenig 89</ac:parameter></ac:structured-macro> \[Koenig 89\] Andrew Koenig. _C Traps and Pitfalls_. Addison-Wesley Professional, January 1, 1989. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96661aa0-f4dd-4c2e-a586-46c4e6cda470"><ac:parameter ac:name="">Kuhn 06</ac:parameter></ac:structured-macro> \[Kuhn 06\] Kuhn, Markus. [_UTF-8 and Unicode FAQ for Unix/Linux_|http://www.cl.cam.ac.uk/~mgk25/unicode.html], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37810499-5f0d-470a-80a1-78aaa8b23df5"><ac:parameter ac:name="">Lai 06</ac:parameter></ac:structured-macro> \[Lai 06\] Lai, Ray. "[Reading Between the Lines|http://undeadly.org/cgi?action=article&sid=20061027031811]." _OpenBSD Journal_, October 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55073e3b-ff5c-49cf-9117-e41c10383a96"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro> \[Lions 96\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1f4808c-f685-4498-8e8b-b5fb403fdab3"><ac:parameter ac:name="">Lockheed Martin 2005</ac:parameter></ac:structured-macro> \[Lockheed Martin 2005\] Lockheed Martin. _Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program_. Document Number 2RDU00001, Rev C. December 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdf02d32-8a32-4528-aa72-1f9dd7e38333"><ac:parameter ac:name="">Loosemore 07</ac:parameter></ac:structured-macro> \[Loosemore 07\] Sandra Loosemore, Richard M. Stallman, Roland McGrath, Andrew Oram, and Ulrich Drepper. [The GNU C Library Reference Manual|http://www.gnu.org/software/libc/manual/]. Edition 0.11. September, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2158b46-7399-4e9d-a650-627124202a90"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 01\] [_flexible array members and designators in C9X_|http://www.usenix.org/publications/login/2001-07/pdfs/mccluskey.pdf] ;login:, July 2001, Volume 26, Number 4, p. 29-32. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de2d0d34-a257-4cfb-8028-a63d4f97b303"><ac:parameter ac:name="">mercy 06</ac:parameter></ac:structured-macro> \[mercy\] mercy. [_Exploiting Uninitialized Data_|http://www.felinemenace.org/papers/UBehavior.zip], January 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b93cf94-b862-46bf-b5c1-88bb0b4d603a"><ac:parameter ac:name="">Microsoft 03</ac:parameter></ac:structured-macro> \[Microsoft 03\] Microsoft Security Bulletin MS03-026, [Buffer Overrun In RPC Interface Could Allow Code Execution (823980)|http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx], September, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0253e293-4204-4d9a-82cf-18ed3eefc1e6"><ac:parameter ac:name="">Microsoft 07</ac:parameter></ac:structured-macro> \[Microsoft 07\] [C Language Reference|http://msdn2.microsoft.com/en-us/library/fw5abdx6(VS.80).aspx], 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2bec31b-c51a-4e98-8307-9f0ef54d056a"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MISRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a59e245-0b87-4ff1-b4a6-b811ed5cec63"><ac:parameter ac:name="">MIT 05</ac:parameter></ac:structured-macro> \[MIT 05\] MIT. "[MIT krb5 Security Advisory 2005-003|http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-recvauth.txt], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3512c90c-6beb-4bec-a03d-32e3b27aa4fe"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro> \[MITRE 07\] MITRE. [Common Weakness Enumeration, Draft 7|http://cwe.mitre.org/], October 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a721cfe7-1cc4-43e5-8622-040799b24906"><ac:parameter ac:name="">MSDN 07</ac:parameter></ac:structured-macro> \[MSDN 07\] MSDN. [Inheritance (Windows)|http://msdn2.microsoft.com/en-us/library/ms683463.aspx], 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3fc828e-c97a-48e3-9f3c-1ca58291ef24"><ac:parameter ac:name="">Murenin 07</ac:parameter></ac:structured-macro> \[Murenin 07\] Constantine A. Murenin. [cnst: 10-year-old pointer-arithmetic bug in make(1) is now gone, thanks to malloc.conf and some debugging|http://cnst.livejournal.com/24040.html], June 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80d7bb38-502c-4ed7-b9ed-005f36c0067b"><ac:parameter ac:name="">NAI 98</ac:parameter></ac:structured-macro> \[NAI 98\] Network Associates Inc. [Bugtraq: Network Associates Inc. Advisory (OpenBSD)|http://seclists.org/bugtraq/1998/Aug/0071.html], 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69553788-b516-4f2f-b6e4-4bdd8acda8d0"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA Glenn Research Center, Office of Safety Assurance Technologies. [_NASA Software Safety Guidebook_|http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] (NASA-GB-1740.13). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52ae847f-33b1-4088-8cc5-293cb2dbf882"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0fc39a0-f67d-42a3-bd1e-8841ca4198d9"><ac:parameter ac:name="">NIST 06b</ac:parameter></ac:structured-macro> \[NIST 06b\] NIST. [DRAFT Source Code Analysis Tool Functional Specification. | http://samate.nist.gov/docs/SAMATE_source_code_analysis_tool_spec_09_15_06.pdf] NIST Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, September 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c256fac-b6a5-4d7a-80e0-f201105ed152"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro> \[Open Group 97\] The Open Group. [_The Single UNIX® Specification, Version 2_|http://www.opengroup.org/onlinepubs/7990989775/toc.htm], 1997. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="224589dc-1d71-400a-9e46-4da7dcee3dd1"><ac:parameter ac:name="">Open Group 97b</ac:parameter></ac:structured-macro> \[Open Group 97b\] The Open Group. [_Go Solo 2 - The Authorized Guide to Version 2 of the Single UNIX Specification_|http://www.unix.org/whitepapers/64bit.html], May 1997. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eda6eee3-7def-44d1-94a5-580bea2ba84c"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro> \[Open Group 04\] The Open Group and the IEEE. [_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm], 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3878ca4f-b98b-4457-a704-c860dfe2b854"><ac:parameter ac:name="">Plakosh 05</ac:parameter></ac:structured-macro> \[Plakosh 05\] Plakosh, Dan. _[_Consistent Memory Management Conventions_|https://buildsecurityin.us-cert.gov/daisy/bsi/articles/knowledge/coding/476.html]_, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d2723a3-a9ad-415d-b5d4-4e7133d2ef3e"><ac:parameter ac:name="">Plum 85</ac:parameter></ac:structured-macro> \[Plum 85\] Plum, Thomas. _Reliable Data Structures in C_. Kamuela, HI: Plum Hall, Inc., 1985 (ISBN 0-911537-04-X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a4a5231-0cf3-4dd5-aab7-f4c89e92d1e0"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas, & Saks, Dan. _C Programming Guidelines, 2nd ed_. Kamuela, HI: Plum Hall, Inc., 1989 (ISBN 0911537074). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dd0c04c-383d-42d1-8f2c-95194b4a1207"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., 1991 (ISBN 0911537104). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d5d4b1d-98b5-4606-9170-b946ffe8751b"><ac:parameter ac:name="">Redwine 06</ac:parameter></ac:structured-macro> \[Redwine 06\] Redwine, Samuel T., Jr., ed. _Secure Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.1_. U.S. Department of Homeland Security, September 2006. See [Software Assurance Common Body of Knowledge|https://buildsecurityin.us-cert.gov/daisy/bsi/resources/dhs/95.html] on Build Security In. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8029f4db-0405-4b4a-bacf-0a31b70ad293"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro> \[Saks 99\] Saks, Dan. "[const T vs.T const|http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]." _Embedded Systems Programming_, February 1999, pp. 13-16. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33c05c81-debe-4988-bb93-7a9d561b405a"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro> \[Saks 07\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, July 1, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e0fa5ae-f001-4fc0-b47a-8b38565aa9d4"><ac:parameter ac:name="">Schwarz 05</ac:parameter></ac:structured-macro> \[Schwarz 05\] Schwarz, B. Hao Chen Wagner, D. Morrison, G. West, J. Lin, J. Wei Tu. _Model checking an entire Linux distribution for security violations_. Published in proceedings of the 21st Annual Computer Security Applications Conference, December 2005 (ISSN: 1063-9527; ISBN: 0-7695-2461-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="995e6c96-fd3e-43af-930d-4e185359283f"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae62459c-b2c5-421f-826e-55733610839e"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, R. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="263618b4-5069-46b6-8944-5d593da2bce8"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, R. "Managed String Library for C, C/C++." _Users Journal_ _23_, 10 (October 2005): 30-34. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0fd8ba0-244b-4952-9588-f990befe5108"><ac:parameter ac:name="">Seacord 05c</ac:parameter></ac:structured-macro> \[Seacord 05c\] Robert C. Seacord. [_Variadic Functions: How they contribute to security vulnerabilities and how to fix them_|http://www.cert.org/books/secure-coding/LWM%203-11%20%28Seacord%29.pdf]. Linux World Magazine. November, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02ab0c12-5884-4b6a-a552-043e3141f771"><ac:parameter ac:name="">Spinellis 06</ac:parameter></ac:structured-macro> \[Spinellis 06\] Spinellis, Diomidis. [_Code Quality: The Open Source Perspective_|http://www.spinellis.gr/codequality]. Addison-Wesley, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7faec76c-da21-47b9-94fa-c59f871183cc"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro> \[Steele 77\] Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7ea5e9c-28b9-4c9f-b2de-a425ba291832"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b2c34f6-5ce1-42bc-8291-07b56160f55f"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. [_comp.lang.c Frequently Asked Questions_|http://c-faq.com/], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae1f417c-a0a0-406e-be1a-83a2c723ed87"><ac:parameter ac:name="">Sun 05</ac:parameter></ac:structured-macro> \[Sun 05\] [C User's Guide|http://docs.sun.com/source/819-3688/]. 819-3688-10. Sun Microsystems, Inc., 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70ce90e0-8631-4e8d-8207-ac2031e0dcfa"><ac:parameter ac:name="">van de Voort 07</ac:parameter></ac:structured-macro> \[van de Voort 07\] van de Voort, Marco. [Development Tutorial (a.k.a Build FAQ)|http://www.stack.nl/~marcov/buildfaq.pdf], January 29, 2007. |
\[van Sprundel 06\] van Sprundel, Ilja. [Unusual Bugs|http://ilja.netric.org/files/Unusual%20bugs.pdf], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60bb907d-aa62-4e8d-b8a6-787cc4743e98"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07ea37a0-a7d3-4f6c-aeae-5abe258c86c2"><ac:parameter ac:name="">Viega 05</ac:parameter></ac:structured-macro> \[Viega 05\] Viega, John. [CLASP Reference Guide Volume 1.1.|http://www.securesoftware.com/process/] Secure Software, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a76b327-592f-4086-9770-1f7f371cc489"><ac:parameter ac:name="">VU196240</ac:parameter></ac:structured-macro> \[VU#196240\] Taschner, Chris & Manion, Art. Vulnerability Note [VU#196240|http://www.kb.cert.org/vulnotes/id/196240], _Sourcefire Snort DCE/RPC preprocessor does not properly reassemble fragmented packets_, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac857964-a314-41c1-b476-86830e8eb968"><ac:parameter ac:name="">VU286468</ac:parameter></ac:structured-macro> \[VU#286468\] Burch, Hal. Vulnerability Note [VU#286468|http://www.kb.cert.org/vulnotes/id/286468], _Ettercap contains a format string error in the "curses_msg()" function_, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3091f674-cc5b-4c9c-b73e-40d2014175c1"><ac:parameter ac:name="">VU551436</ac:parameter></ac:structured-macro> \[VU#551436\] Giobbi, Ryan. Vulnerability Note [VU#551436|http://www.kb.cert.org/vulnotes/id/551436], _Mozilla Firefox SVG viewer vulnerable to buffer overflow,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b82281db-5acb-4c0b-8410-7f8a181bc538"><ac:parameter ac:name="">VU568148</ac:parameter></ac:structured-macro> \[VU#568148\] Finlay, Ian A. & Morda, Damon G. Vulnerability Note [VU#568148|http://www.kb.cert.org/vulnotes/id/568148], _Microsoft Windows RPC vulnerable to buffer overflow_, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d26161f-232b-440d-a4ac-5fc27404824f"><ac:parameter ac:name="">VU623332</ac:parameter></ac:structured-macro> \[VU#623332\] Mead, Robert. Vulnerability Note [VU#623332|http://www.kb.cert.org/vuls/id/623332], _MIT Kerberos 5 contains double free vulnerability in "krb5_recvauth()" function,_ 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="271176eb-57fc-4bd5-b900-534449d8d3de"><ac:parameter ac:name="">VU649732</ac:parameter></ac:structured-macro> \[VU#649732\] Gennari, Jeff. Vulnerability Note [VU#649732|http://www.kb.cert.org/vulnotes/id/649732], _Samba AFS ACL mapping VFS plug-in format string vulnerability,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fc19bf3-89a3-48cc-b0af-aac0954d3fb4"><ac:parameter ac:name="">VU743092</ac:parameter></ac:structured-macro> \[VU#743092\] Jason A. Rafail; Jeffrey S. Havrilla. Vulnerability Note [VU#743092|https://www.kb.cert.org/vulnotes/id/743092], _realpath(3) function contains off-by-one buffer overflow,_ July 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5186611-3d34-4a52-ae33-f60fc590bcd7"><ac:parameter ac:name="">VU881872</ac:parameter></ac:structured-macro> \[VU#881872\] Manion, Art & Taschner, Chris. Vulnerability Note [VU#881872|http://www.kb.cert.org/vulnotes/id/881872], _Sun Solaris telnet authentication bypass vulnerability,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfe89de6-2afc-4d6b-b45c-719df0cd8501"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Warren, Henry S. [_Hacker's Delight_|http://www.hackersdelight.org/]. Boston, MA: Addison Wesley Professional, 2002 (ISBN 0201914654). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d483bfd1-0f5a-4a84-853e-a7e077fac466"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] Wheeler, David. [Secure Programming for Linux and Unix HOWTO, v3.010|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/], March 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db41a3a9-8338-4488-bfee-04324429b365"><ac:parameter ac:name="">Yergeau 98</ac:parameter></ac:structured-macro> \[Yergeau 98\] Yergeau, F. [RFC 2279 - UTF-8, a transformation format of ISO 10646|http://www.faqs.org/rfcs/rfc2279.html], January 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6bd9c0d-0cda-4c0a-a8d0-f5e08ed1fd3d"><ac:parameter ac:name="">Zalewski 01</ac:parameter></ac:structured-macro> \[Zalewski 01\] Michal Zalewski. [_Delivering Signals for Fun and Profit: Understanding, exploiting and preventing signal-handling related vulnerabilities_|http://lcamtuf.coredump.cx/signals.txt], May, 2001. |