<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20e6919e-49dd-4c82-81dc-dd8d980ae10b"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Burch, H.; Long, F.; & Seacord, R. [_Specifications for Managed Strings_|http://www.sei.cmu.edu/publications/documents/06.reports/06tr006.html] (CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54f7f724-b99d-4d23-ab9c-ce11ace61abb"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro> \[CERT 06\] CERT. [Managed String Library|http://www.cert.org/secure-coding/managedstring.html] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9385f7fe-81b7-402a-9b3c-0742c4bca8dc"><ac:parameter ac:name="">Dewhurst 02</ac:parameter></ac:structured-macro> \[Dewhurst 02\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c072df1-cac6-4898-9802-de12c1cb505e"><ac:parameter ac:name="">Dowd 06</ac:parameter></ac:structured-macro> \[Dowd 06\] Dowd, M.; McDonald, J.; & Schuh, J. _The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities_. Boston, MA: Addison-Wesley, 2006. See [http://taossa.com] for updates and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71785884-627e-400a-92c7-537f4f35cb8f"><ac:parameter ac:name="">Drepper 06</ac:parameter></ac:structured-macro> \[Drepper 06\] Drepper, Ulrich. [Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong).|http://people.redhat.com/drepper/defprogramming.pdf] May 3, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc19ad55-1230-41b4-948b-83f46410c0cb"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro> \[FSF 05\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cd5e842-6241-4509-a85c-157aa2217cc4"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graff 03\] Graff, Mark G. & Van Wyk, Kenneth R. Secure Coding: Principles and Practices. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7c72e65-b118-4a20-9504-452c7e4cd50e"><ac:parameter ac:name="">Griffiths 06</ac:parameter></ac:structured-macro> \[Griffiths 06\] Griffiths, Andrew. "[Clutching at straws: When you can shift the stack pointer|http://felinemenace.org/papers/p63-0x0e_Shifting_the_Stack_Pointer.txt]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b68745c5-897d-40bd-8adb-c9572be6dddb"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="878ed933-9b7f-4673-a368-d2f2b6bde8c8"><ac:parameter ac:name="">Hatton 95</ac:parameter></ac:structured-macro> \[Hatton 95\] Hatton, Les. _Safer C: Developing Software for High-Integrity and Safety-Critical Systems_. New York, NY: McGraw-Hill Book Company, 1995 (ISBN 0-07-707640-0). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dab167cc-438c-4a88-9046-e9e406e57342"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro> \[ilja 06\] ilja. "[readlink abuse|http://blogs.23.nu/ilja/stories/12551/]." _ilja's blog_, August 13, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a5b552d-0481-445d-ad14-302a26567504"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b2758e3-7b5a-4d3e-aaf6-98b8a0ea22ef"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. _Extensions to the C Library, --- Part I: Bounds-checking interfaces_. April, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec4a1a97-aeb7-41dc-a665-19ed7f343259"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan, B. W. & Ritchie, D. M. _The C Programming Language, 2nd ed._ Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c37536b2-792d-4803-b300-5310c11b6f3f"><ac:parameter ac:name="">Kettle 02</ac:parameter></ac:structured-macro> \[Kettlewell 02\] Kettlewell, Richard. [_C Language Gotchas_|http://www.greenend.org.uk/rjk/2001/02/cfu.html] (February 2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cda8b45-3f2d-45e1-ae2a-913c2e8f5202"><ac:parameter ac:name="">Kettle 03</ac:parameter></ac:structured-macro> \[Kettlewell 03\] Kettlewell, Richard. [_Inline Functions In C_|http://www.greenend.org.uk/rjk/2003/03/inline.html] (March 2003). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b7ce46c-aa4d-44df-86a2-baffcca0bab0"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. [_Bullet Proof Integer Input Using strtol()_|http://home.att.net/~jackklein/c/code/strtol.html] (2002). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80d348b9-b367-454d-80b6-5e7cc1baa0ab"><ac:parameter ac:name="">Lai 06</ac:parameter></ac:structured-macro> \[Lai 06\] Ray Lai. [_Reading Between the Lines_|http://undeadly.org/cgi?action=article&sid=20061027031811]. OpenBSD Journal. October, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b44fffb1-1eb2-4d50-a5ed-c77ad18a5721"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro> \[mercy\] mercy. [_Exploiting Uninitialized Data_|http://www.felinemenace.org/papers/UBehavior.zip] (January 2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcfb7dda-f7e2-4af6-af0b-1b6f31848b6c"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e911b927-d7a3-410b-b901-3a2d8fe5084d"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA Glenn Research Center, Office of Safety Assurance Technologies. [_NASA Software Safety Guidebook_|http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] (NASA-GB-1740.13). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dca486ee-ab70-4058-a90f-a83d0c75780f"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/] (2006). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c9fa326-7933-4efc-85d1-2f4823c3cb4a"><ac:parameter ac:name="">NIST 06b</ac:parameter></ac:structured-macro> \[NIST 06b\] NIST. [DRAFT Source Code Analysis Tool Functional Specification. | http://samate.nist.gov/docs/SAMATE_source_code_analysis_tool_spec_09_15_06.pdf] Information Technology Laboratory (ITL), oftware Diagnostics and Conformance Testing Division. September, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae015223-76b8-4d86-925c-1aa1ce9ce8aa"><ac:parameter ac:name="">Open Group 97</ac:parameter></ac:structured-macro> \[Open Group 97\] The Open Group. [_The Single UNIX® Specification, Version 2_|http://www.opengroup.org/onlinepubs/7990989775/toc.htm] (1997). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc02f8e5-f552-4d14-92ff-66ecffb4228e"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro> \[Open Group 04\] The Open Group. "[_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm]." (2004). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3598ecf-add4-4e8c-b87d-29579ca98361"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas. _C Programming Guidelines, 2nd ed_. Kamuela, HI: Plum Hall, Inc., 1989 (ISBN 0911537074). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cded898-c7e9-4343-8edf-a1aaae828b1d"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., 1991 (ISBN 0911537104). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fe5c4f2-6b9f-4a88-bbf5-5a57f8205af3"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro> \[Saks 99\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65de8b74-ce8c-4327-a3a7-fdb81d2b55d8"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfd5ac68-19be-4fa8-8789-3b7f772ad3fd"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, R. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2300ae9c-7a93-4ba7-a0e9-03e10dcec8e1"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, R. "Managed String Library for C, C/C++." _Users Journal_ _23_, 10 (October 2005): 30-34. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b63b0d5c-a4f5-4788-80ab-d4ce28cf3d1c"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14083449-90cf-495d-bf1c-8f7ff283c8e0"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. [_comp.lang.c Frequently Asked Questions_|http://c-faq.com/] (2005). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c7b7254-9c04-47b7-b0f8-a075fd361aa3"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="adb85a7e-fac8-4960-a0db-6dd30383152f"><ac:parameter ac:name="">Viega 05</ac:parameter></ac:structured-macro> \[Viega 05\] Viega, John. [CLASP Reference Guide Volume 1.1.|http://www.securesoftware.com/process/] Secure Software. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f710796d-612b-43c2-b49b-885ca557825f"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654). |