<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c69fb81a-480f-4776-9a84-331dc371cdaa"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f132296-a78e-43c1-88f0-8aea386ed7f9"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro> \[CERT 06\] CERT. [Managed String Library|http://www.cert.org/secure-coding/managedstring.html] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3512d91d-3a6e-4b56-b028-9c5a19a69ea9"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graf 03\] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3cd82b3-d3b9-4582-8322-7638db9a3c65"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96360a26-c3ed-4504-910d-310a588bc16f"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro> \[Hatton 04\] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d2ea40b-d0bd-40c9-be57-5a8471bc3ac4"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro> \[ilja 06\] ilja. "[readlink abuse|http://blogs.23.nu/ilja/stories/12551/]." _ilja's blog_, August 13, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4439f1e-25e8-4baa-8b6c-ff94100fad5d"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. Programming Languages --- C, Second Edition, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1b767c8-295f-4233-a245-ef3bbbf6968a"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. Extensions to the C Library, --- Part I: Bounds-checking interfaces. April, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51ebdb38-634a-4dcb-81fc-b12895d3f317"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="183364cb-246a-4c89-83e9-20df3bb7a134"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. _Bullet Proof Integer Input Using strtol()_. [http://home.att.net/~jackklein/c/code/strtol.html] (2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f53a5669-3164-427e-9ef5-34d98fa92f7f"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro> \[mercy\] mercy. _Exploiting Uninitialized Data_. [http://www.felinemenace.org/papers/UBehavior.zip] (January 2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f7bfabd-7915-47e1-a6fe-aadc52927b0f"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4 |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37a95785-b1e9-4cb8-b92d-0e776fd37bcf"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. [http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac2de83b-3a56-45f6-85a2-596c48c2c6fc"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. SAMATE Reference Dataset (SRD).See [http://samate.nist.gov/SRD/srdFiles/] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8860597f-ab12-4a65-b969-19ff87f4968c"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro> \[Open Group 97\] The Open Group. _[_The Single UNIX ® Specification, Version 2_|http://www.opengroup.org/pubs/online/7908799/xsh/readlink.html]_ (1997). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2afe2820-dc69-4667-a7f1-de9297a7405b"><ac:parameter ac:name="">Open Group 04a</ac:parameter></ac:structured-macro> \[Open Group 04a\] The Open Group. "[readlink|http://www.opengroup.org/onlinepubs/000095399/functions/readlink.html]." _The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_ (2004). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d26cc1da-bb2c-40a5-85aa-cb6bcaa3b491"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bc3a234-a7c0-4b8a-8679-689ef7acfece"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Thomas Plum, Dan Saks. C+\+ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104 |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8450728-14bf-4f0e-a65c-d098bfadfa89"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa61cd36-b347-4a35-99c0-2ea83639eda6"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="171b01bf-e918-49cc-ba5c-3b0be8e23a65"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, R. Managed String Library for C. C/C+\+ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b913398-2e07-4262-919c-48e7d28d3237"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec26ca9c-b2ef-4aa3-ab92-89aa61dae9c4"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. _comp.lang.c Frequently Asked Questions_. [http://c-faq.com/] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15cfd9e7-f0ba-4618-8b7e-650193c1f75c"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e734956-4d94-4f3e-9d49-48b013f88554"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654. |