<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b95f0650-1b8e-4848-b2a8-903cc6792e40"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Burch, H.; Long, F.; & Seacord, R. [_Specifications for Managed Strings_|http://www.sei.cmu.edu/publications/documents/06.reports/06tr006.html] (CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="648eb48a-8030-428f-9c36-6b78271394cb"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro> \[CERT 06\] CERT. [Managed String Library|http://www.cert.org/secure-coding/managedstring.html] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32703bc5-34f0-4be0-a7d3-0e2a6445420d"><ac:parameter ac:name="">Dewhurst 02</ac:parameter></ac:structured-macro> \[Dewhurst 02\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15efa1fc-0b8e-4226-b03a-b5d71e0ca83f"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro> \[FSF 05\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc08d18-be10-4016-a881-47ecb06591e9"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graff 03\] Graff, Mark G. & Van Wyk, Kenneth R. Secure Coding: Principles and Practices. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5380e0b9-060d-401d-81b4-64b0e67d9ce7"><ac:parameter ac:name="">Griffiths 06</ac:parameter></ac:structured-macro> \[Griffiths 06\] Griffiths, Andrew. "[Clutching at straws: When you can shift the stack pointer|http://felinemenace.org/papers/p63-0x0e_Shifting_the_Stack_Pointer.txt]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e804ae0f-c80c-4838-96a2-72bb321c6d1d"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40daee06-a5ac-4a44-bf63-88961e438464"><ac:parameter ac:name="">Hatton 95</ac:parameter></ac:structured-macro> \[Hatton 95\] Hatton, Les. _Safer C: Developing Software for High-Integrity and Safety-Critical Systems_. New York, NY: McGraw-Hill Book Company, 1995 (ISBN 0-07-707640-0). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b4e4929-cbc0-48b4-8119-0c1bd286d74c"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro> \[ilja 06\] ilja. "[readlink abuse|http://blogs.23.nu/ilja/stories/12551/]." _ilja's blog_, August 13, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="236baaac-79c4-43e3-be8d-3561f1666cb5"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5892c58a-c389-4485-8bd4-48b74212ab5e"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. _Extensions to the C Library, --- Part I: Bounds-checking interfaces_. April, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4eda0ba-9584-402f-a3fd-b168e5cd47b2"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan, B. W. & Ritchie, D. M. _The C Programming Language, 2nd ed._ Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="531922f5-a532-4004-94e0-df5e6c5ea861"><ac:parameter ac:name="">Kettle 02</ac:parameter></ac:structured-macro> \[Kettlewell 03\] Kettlewell, Richard. [_C Language Gotchas_|http://www.greenend.org.uk/rjk/2001/02/cfu.html] (February 2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0cfb2c3-4b5d-4bef-85f6-4f6133493e2e"><ac:parameter ac:name="">Kettle 03</ac:parameter></ac:structured-macro> \[Kettlewell 03\] Kettlewell, Richard. [_Inline Functions In C_|http://www.greenend.org.uk/rjk/2003/03/inline.html] (March 2003). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f01dc5f-28b4-4196-b2b2-be0e09b927bf"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. [_Bullet Proof Integer Input Using strtol()_|http://home.att.net/~jackklein/c/code/strtol.html] (2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad73f4f4-aaad-40e3-8b7e-22d85f72a13d"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro> \[mercy\] mercy. [_Exploiting Uninitialized Data_|http://www.felinemenace.org/papers/UBehavior.zip] (January 2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59765b28-cf16-4be3-8c8e-9fdac6f326b4"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcd80b84-38b1-479a-a47e-ac96996e2ef9"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA Glenn Research Center, Office of Safety Assurance Technologies. [_NASA Software Safety Guidebook_|http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] (NASA-GB-1740.13). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27edc626-a45b-4f5b-b1b6-5b72c06853bc"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67487fa2-a9d0-45ba-a7b7-ae23065f7d19"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro> \[Open Group 97\] The Open Group. [_The Single UNIX ® Specification, Version 2_|http://www.opengroup.org/pubs/online/7908799/xsh/readlink.html] (1997). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9d58a96-205a-4d71-9069-986c307854b0"><ac:parameter ac:name="">Open Group 04a</ac:parameter></ac:structured-macro> \[Open Group 04a\] The Open Group. "[readlink|http://www.opengroup.org/onlinepubs/000095399/functions/readlink.html]." _The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_ (2004). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2cf20f4-394b-4490-8552-66558c55fa46"><ac:parameter ac:name="">Open Group 04b</ac:parameter></ac:structured-macro> \[Open Group 04b\] The Open Group. "[realpath|http://www.opengroup.org/onlinepubs/009695399/functions/realpath.html]." The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition\_ (2004). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8bd8863-ef31-4608-9435-94e6a9d5442c"><ac:parameter ac:name="">Open Group 04c</ac:parameter></ac:structured-macro> \[Open Group 04c\] The Open Group. "[open|http://www.opengroup.org/onlinepubs/009695399/functions/open.html]." The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition\_ (2004). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd4c559a-21f1-4412-8ef9-67d9f1e7ebf2"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas. _C Programming Guidelines, 2nd ed_. Kamuela, HI: Plum Hall, Inc., 1989 (ISBN 0911537074). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="835a62a9-a6c6-4d17-9450-304558be6827"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., 1991 (ISBN 0911537104). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34af26f5-8ea4-43bc-a2d4-6c85c11ab208"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro> \[Saks 99\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95a3a545-b05f-4077-affe-bd5f033169c6"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0c55ae3-b959-40a0-89a6-f38201fcfd5f"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, R. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66d76390-aefd-4abd-863f-246c6fbb6b6d"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, R. "Managed String Library for C, C/C++." _Users Journal_ _23_, 10 (October 2005): 30-34. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08e3b826-90c1-456d-a947-d68f4175f70d"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54bc9d5b-6f45-444e-befd-27ecc95bb601"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. [_comp.lang.c Frequently Asked Questions_|http://c-faq.com/] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87ca3aad-1a20-4e4d-9757-d94fb869117f"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="def2c3da-32d4-47be-b2bb-71e7fab4d1f7"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654). |