<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="894a050a-0f23-4ca8-a229-859df694fa1a"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7483ce45-0013-403a-8988-928d7f96599a"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro> \[CERT 06\] CERT. [Managed String Library|http://www.cert.org/secure-coding/managedstring.html] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37197c02-cb51-4f0d-8094-ec4d3b135081"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graf 03\] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4454f5d5-a862-48a9-9b35-15e18c74ec38"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a16e6dd5-88c3-48aa-a53d-6e5a03b47ca5"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro> \[Hatton 04\] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c6b93d5-ca06-44a2-b73d-7753f936c68c"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. Programming Languages --- C, Second Edition, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c85f4ef0-f449-4207-8e9e-fbf33bd6965e"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. Extensions to the C Library, --- Part I: Bounds-checking interfaces. April, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cacc3445-b538-454c-ae60-173ad90343e3"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31819e88-12af-4595-83c1-c9c80be3f307"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. _Bullet Proof Integer Input Using strtol()_. [http://home.att.net/~jackklein/c/code/strtol.html] (2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8719328-5240-41fc-a76c-4c0dd9e0e8a0"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro> \[mercy\] mercy. _Exploiting Uninitialized Data_. [http://www.felinemenace.org/papers/UBehavior.zip] (January 2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0ecaa75-7903-4f9a-b6a8-3a40fc299182"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4 |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d138f1b-c032-4997-a0ce-207aa496de6e"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. [http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="015c42fc-706e-42f5-8873-bdfadf1494dc"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. SAMATE Reference Dataset (SRD).See [http://samate.nist.gov/SRD/srdFiles/] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a8c7e3e-5a0b-4d74-aab8-ace639c71360"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f8ddf7d-a640-4c0f-abaf-3d36d998db95"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Thomas Plum, Dan Saks. C+\+ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104 |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6da8a77-b4a6-4014-b19d-e3f34b6b6d79"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b4bfe50-2876-47ce-8efe-f6f03871e9c4"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94205552-1c9e-4488-abc6-0835427dbab4"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, R. Managed String Library for C. C/C+\+ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ff90206-8aa9-4df3-af9a-646669b1cda2"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2f2c252-853b-4b38-b3e0-938ef72ebe7c"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. _comp.lang.c Frequently Asked Questions_. [http://c-faq.com/] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a535d97-d2c9-4fef-bc87-f2a206d3e8b6"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fad728c-3cd5-48a1-bab1-0bd0ecde82df"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654. |