<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c665f813-a207-4050-aef0-7296788ddf69"><ac:parameter ac:name="">Apple 06</ac:parameter></ac:structured-macro> \[Apple 06\] Apple, Inc. [_Secure Coding Guide_|http://developer.apple.com/documentation/Security/Conceptual/SecureCodingGuide/SecureCodingGuide.pdf], May 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="393cd6ba-9909-4b45-acd9-8e6a3ceaae39"><ac:parameter ac:name="">Austin Group 08</ac:parameter></ac:structured-macro> \[Austin Group 08\] "Draft Standard for Information Technology - Portable Operating System Interface (POSIX®) - Draft Technical Standard: Base Specifications, Issue 7," IEEE Unapproved Draft Std P1003.1 D5.1. Prepared by the [Austin Group|http://www.opengroup.org/austin/]. New York: Institute of Electrical & Electronics Engineers, Inc., May 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="adf31dd9-edb1-422a-95dd-066c87dcac14"><ac:parameter ac:name="">Banahan 03</ac:parameter></ac:structured-macro> \[Banahan 03\] Banahan, Mike. [_The C Book_|http://www.phy.duke.edu/~rgb/General/c_book/c_book/index.html], 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ecc7f0d-f61e-4a37-8b9c-e6ce984e030e"><ac:parameter ac:name="">Beebe 05</ac:parameter></ac:structured-macro> \[Beebe 05\] Beebe, Nelson H. F. [Re: Remainder (%) operator and GCC|http://gcc.gnu.org/ml/gcc-help/2005-11/msg00141.html], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f574f68a-bd78-4924-825b-9631d91bd11d"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro> \[Becker 08\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36181551-5767-4911-b740-db4f616095de"><ac:parameter ac:name="">Brainbell.com</ac:parameter></ac:structured-macro> \[Brainbell.com\] Brainbell.com. [_Advice and Warnings for C Tutorials_|http://www.brainbell.com/tutors/c/Advice_and_Warnings_for_C/]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="771a5b33-bf0e-402b-8fac-9078c66b3858"><ac:parameter ac:name="">Bryant 03</ac:parameter></ac:structured-macro> \[Bryant 03\] Bryant, Randal E., & O'Halloran, David. _Computer Systems: A Programmer's Perspective_. Prentice Hall, 2003 (ISBN 0-13-034074-X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a860201d-bd57-4f67-9a44-87cd5d93f0cd"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro> \[Burch 06\] Burch, Hal, Long, Fred, & Seacord, Robert C. [_Specifications for Managed Strings_|http://www.sei.cmu.edu/publications/documents/06.reports/06tr006.html] (CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81c5141a-2e57-4317-b139-a68f772537aa"><ac:parameter ac:name="">Callaghan 95</ac:parameter></ac:structured-macro> \[Callaghan 95\] Callaghan, B., Pawlowski, B., & Staubach, P. [IETF RFC 1813 NFS Version 3 Protocol Specification|http://www.ietf.org/rfc/rfc1813.txt], June 1995. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02b8a7eb-ea2f-440e-b041-6a45d180aacc"><ac:parameter ac:name="">CERT 06a</ac:parameter></ac:structured-macro> \[CERT 06a\] CERT/CC. [CERT/CC Statistics 1988---2006|http://www.cert.org/stats/cert_stats.html]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="721007b4-2a5e-4a26-a2ff-d6ded687f9b9"><ac:parameter ac:name="">CERT 06b</ac:parameter></ac:structured-macro> \[CERT 06b\] CERT/CC. US-CERT's [Technical Cyber Security Alerts|http://www.us-cert.gov/cas/techalerts/index.html]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1880a1c-8aa2-46c0-aae9-3b2b6f9c7513"><ac:parameter ac:name="">CERT 06c</ac:parameter></ac:structured-macro> \[CERT 06c\] CERT/CC. [Secure Coding|http://www.cert.org/secure-coding/] web site. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7beb662-8bc4-458f-882c-0412fb5a1369"><ac:parameter ac:name="">Chen 02</ac:parameter></ac:structured-macro> \[Chen 02\] Chen, H., Wagner, D., & Dean, D. "Setuid demystified." USENIX Security Symposium, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f01d183c-4850-431e-b6c7-0be7ac19e9cf"><ac:parameter ac:name="">Corfield 93</ac:parameter></ac:structured-macro> \[Corfield 93\] Corfield, Sean A. "[Making String Literals 'const'|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/1993/N0389.asc]," November 1993. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5417b186-a4f0-4c78-8576-92ebc82efd8f"><ac:parameter ac:name="">Coverity 07</ac:parameter></ac:structured-macro> \[Coverity 07\] Coverity Prevent User's Manual (3.3.0), 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7396ebca-97c5-4297-a9b4-0e61782a70f2"><ac:parameter ac:name="">CVE</ac:parameter></ac:structured-macro> \[CVE\] [Common Vulnerabilities and Exposures|http://cve.mitre.org/]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c625d6d2-fda0-466c-814b-eb5528250c05"><ac:parameter ac:name="">CPPReference</ac:parameter></ac:structured-macro> \[C+\+ Reference\] [Standard C Library, General C++, C+\+ Standard Template Library|http://www.cppreference.com/] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7420a6b9-fab5-4641-8507-edc11ac5b8bb"><ac:parameter ac:name="">Dewhurst 02</ac:parameter></ac:structured-macro> \[Dewhurst 02\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston: Addison-Wesley Professional, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b150df6-2ee0-4411-9f96-89c43ef92c7e"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro> \[Dewhurst 05\] Dewhurst, Stephen C. _C+\+ Common Knowledge: Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31a1770f-5ea8-4f93-887d-f8729995d7f6"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 06\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a24d99aa-1240-42e8-a8a6-ead06ed8b164"><ac:parameter ac:name=""> DOD 5220</ac:parameter></ac:structured-macro> \[DOD 5220\] U.S. Department of Defense. [DoD Standard 5220.22-M|http://security.ouhsc.edu/docs/policies/approved/DoD_5220.doc] (Word document). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19b4b887-4e01-4c74-8148-fae8fd2aee07"><ac:parameter ac:name="">Dowd 06</ac:parameter></ac:structured-macro> \[Dowd 06\] Dowd, M., McDonald, J., & Schuh, J. _The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities_. Boston: Addison-Wesley, 2006. See [http://taossa.com] for updates and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="530466fe-175b-4f9d-972c-15cf55f413d1"><ac:parameter ac:name="">Drepper 06</ac:parameter></ac:structured-macro> \[Drepper 06\] Drepper, Ulrich. [Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong)|http://people.redhat.com/drepper/defprogramming.pdf], May 3, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec71df87-9aac-43f8-8659-a56f1893967c"><ac:parameter ac:name="">Eckel 07</ac:parameter></ac:structured-macro> \[Eckel 07\] Eckel, Bruce. [_Thinking in C+\+ Volume 2_|http://bruce-eckel.developpez.com/livres/cpp/ticpp/v2/], January 25, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="335e1cce-e61f-4454-9717-bceedf787560"><ac:parameter ac:name="">ECTC 98</ac:parameter></ac:structured-macro> \[ECTC 98\] Embedded C+\+ Technical Committee. [_The Embedded C+\+ Programming Guide Lines_|http://www.caravan.net/ec2plus/guide.html], Version WP-GU-003. January 6, 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="131a434e-c95a-4004-b242-f4cf314017d7"><ac:parameter ac:name="">Finlay 03</ac:parameter></ac:structured-macro> \[Finlay 03\] Finlay, Ian A. CERT Advisory CA-2003-16, [Buffer Overflow in Microsoft RPC|http://www.cert.org/advisories/CA-2003-16.html]. CERT/CC, July 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9ed44be-fc93-4a66-a736-651e5fadcd07"><ac:parameter ac:name="">Fisher 99</ac:parameter></ac:structured-macro> \[Fisher 99\] Fisher, David & Lipson, Howard. "Emergent Algorithms - A New Method for Enhancing Survivability in Unbounded Systems." _Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32)_. Maui, HI, January 5-8, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1513d3e3-8489-4396-a802-0ddec143c901"><ac:parameter ac:name="">Flake 06</ac:parameter></ac:structured-macro> \[Flake 06\] Flake, Halvar. "[Attacks on uninitialized local variables|http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Flake.pdf]." Black Hat Federal 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7937a28-bce3-4169-808a-341367a8d2dc"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro> \[Fortify 06\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b726377-1299-45ec-9b13-10c2b2d08704"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro> \[FSF 05\] Free Software Foundation. [GCC online documentation|http://gcc.gnu.org/onlinedocs], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="623f0c1d-9ff6-4d09-90df-b101ceea0cbc"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro> \[Garfinkel 96\] Garfinkel, Simson & Spafford, Gene. _Practical UNIX & Internet Security_, 2nd Edition. Sebastopol, CA: O'Reilly Media, April 1996 (ISBN 1-56592-148-8). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9e08294-5019-4605-a134-edac5093d9a0"><ac:parameter ac:name="">GNU Pth</ac:parameter></ac:structured-macro> \[GNU Pth\] Engelschall, Ralf S. [GNU Portable Threads|http://www.gnu.org/software/pth/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f5f752f-3ec8-4b8e-8784-821066d17219"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae763df0-ed2b-4235-b63d-08532ed63f22"><ac:parameter ac:name="">Gough 2005</ac:parameter></ac:structured-macro> \[Gough 2005\] Gough, Brian J. [An Introduction to GCC|http://www.network-theory.co.uk/docs/gccintro/index.html]. Network Theory Ltd, Revised August 2005 (ISBN 0-9541617-9-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8aa3d7c8-b7e5-439b-a886-29a712409175"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graff 03\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cf3871e-f1ed-4b22-b6e7-52e2c79daa11"><ac:parameter ac:name="">Greenman 97</ac:parameter></ac:structured-macro> \[Greenman 97\] Greenman, David. [_serious security bug in wu-ftpd v2.4_|http://seclists.org/bugtraq/1997/Jan/0011.html]. BUGTRAQ Mailing List (bugtraq@securityfocus.com), January 2, 1997. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02566a0a-b78f-450e-b450-0185a61be7b5"><ac:parameter ac:name="">Griffiths 06</ac:parameter></ac:structured-macro> \[Griffiths 06\] Griffiths, Andrew. "[Clutching at straws: When you can shift the stack pointer|http://felinemenace.org/papers/p63-0x0e_Shifting_the_Stack_Pointer.txt]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75b489df-1672-4c9f-a987-5f6384271bef"><ac:parameter ac:name="">Gutmann 96</ac:parameter></ac:structured-macro> \[Gutmann 96\] Gutmann, Peter. [Secure Deletion of Data from Magnetic and Solid-State Memory|http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html], July 1996. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0762ca8c-0eeb-46bb-83ac-00b263410455"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro> \[Haddad 05\] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." _Linux World Magazine_, November 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f57d518-c118-4c2b-a35d-ace3774f1d0d"><ac:parameter ac:name="">Hatton 95</ac:parameter></ac:structured-macro> \[Hatton 95\] Hatton, Les. _Safer C: Developing Software for High-Integrity and Safety-Critical Systems_. New York: McGraw-Hill Book Company, 1995 (ISBN 0-07-707640-0). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fbc9890-2b99-4455-86a7-ba19344ad89e"><ac:parameter ac:name="">Henricson 92</ac:parameter></ac:structured-macro> \[Henricson 92\] Henricson, Mats, & Nyquist, Erik. [Programming in C++, Rules and Recommendations|http://www.doc.ic.ac.uk/lab/cplus/c++.rules/]. Ellemtel Telecommunication Systems Laboratories, 1992. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95e56d31-9d94-4044-9cbc-1b112f766cd6"><ac:parameter ac:name="">Horton 90</ac:parameter></ac:structured-macro> \[Horton 90\] Horton, Mark R. _Portable C Software_. Upper Saddle River, NJ: Prentice-Hall, Inc., 1990 (ISBN:0-13-868050-7). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5225c16-ced4-4a2e-97ae-6584af3d3cda"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro> \[Howard 02\] Howard, Michael, & LeBlanc, David C. _[_Writing Secure Code, 2nd ed. Redmond, WA:_|http://www.microsoft.com/mspress/books/5957.aspx]_. Microsoft Press, December 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41af91b5-edc3-4da5-a69a-f47fa434b711"><ac:parameter ac:name="">HP 03</ac:parameter></ac:structured-macro> \[HP 03\] [Tru64 UNIX: Protecting Your System Against File Name Spoofing Attacks|http://h30097.www3.hp.com/docs/wpapers/spoof_wp/symlink_external.pdf]. Houston, TX: Hewlett-Packard Company, January 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68d435a4-3a23-4bb5-8135-cf4cc322061b"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] _Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA)_, 2nd ed. (IEC 60812). IEC, January 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1fe008b-fe07-4e2f-972d-c42c14449d67"><ac:parameter ac:name="">IEC 61508 4</ac:parameter></ac:structured-macro> \[IEC 61508-4\] _Functional safety of electrical/electronic/programmable electronic safety-related systems - Part 4: Definitions and abbreviations_, 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="143e3518-2385-475c-880a-53809bfdbe55"><ac:parameter ac:name="">IEEE Std 610.12 1990</ac:parameter></ac:structured-macro> \[IEEE Std 610.12 1990\] _IEEE Standard Glossary of Software Engineering Terminology_, September 1990. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="389be272-f601-48cb-9a6a-2a023fa80c74"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10a3446f-2d51-4353-bfb3-503c45657661"><ac:parameter ac:name="">ilja 06</ac:parameter></ac:structured-macro> \[ilja 06\] ilja. "[readlink abuse|http://blogs.23.nu/ilja/stories/12551/]." _ilja's blog_, August 13, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e92d219-c145-4f79-8b3e-34ddbae5e5d9"><ac:parameter ac:name="">Intel 01</ac:parameter></ac:structured-macro> \[Intel 01\] Intel Corp. [_Floating-Point IEEE Filter for Microsoft\* Windows\* 2000 on the Intel® Itanium⢠Architecture_|ftp://download.intel.com/software/opensource/libraries/ieee/ieee_filter_windows2000.pdf], March 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0eeb36bd-d16e-47dc-963e-e27c16da0e1c"><ac:parameter ac:name="">Internet Society 00</ac:parameter></ac:structured-macro> \[Internet Society 00\] The Internet Society. [Internet Security Glossary (RFC 2828)|ftp://ftp.rfc-editor.org/in-notes/rfc2828.txt], 2000. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4ac0898-0813-4411-8853-43d9842c0d39"><ac:parameter ac:name="">ISO/IEC 646-1991</ac:parameter></ac:structured-macro> \[ISO/IEC 646:1991\] ISO/IEC. _Information technology: ISO 7-bit coded character set for information interchange_ (ISO/IEC 646-1991). Geneva, Switzerland: International Organization for Standardization, 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9713f3f1-e80c-4938-9ec4-52c749c53b11"><ac:parameter ac:name="">ISO/IEC 9945-2003</ac:parameter></ac:structured-macro> \[ISO/IEC 9945:2003\] _ISO/IEC 9945:2003 (including Technical Corrigendum 1), Information technology --- Programming languages, their environments and system software interfaces --- Portable Operating System Interface (POSIX®)_. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bd138c3-b9f1-4c82-994c-f2e04e383d89"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899:1999\] ISO/IEC. _Programming Languages---C, 2nd ed_ (ISO/IEC 9899:1999). Geneva, Switzerland: International Organization for Standardization, 1999. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68ee69b1-4afe-4d8c-81e9-489f714973e8"><ac:parameter ac:name="">ISO/IEC 10646-2003</ac:parameter></ac:structured-macro> \[ISO/IEC 10646:2003\] _Information technology - Universal Multiple-Octet Coded Character Set (UCS)_ (ISO/IEC 10646:2003). Geneva, Switzerland: International Organization for Standardization, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b2c4260-71e6-4c39-82e3-6f9678196f81"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro> \[ISO/IEC 14882:2003\] ISO/IEC. _Programming Languages --- C++, Second Edition_ (ISO/IEC 14882-2003). Geneva, Switzerland: International Organization for Standardization, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b74c2cb-a11e-404f-8c52-d630944812b0"><ac:parameter ac:name="">ISO/IEC 23360-1-2006</ac:parameter></ac:structured-macro> \[ISO/IEC 23360-1:2006\] [_Linux Standard Base (LSB) core specification 3.1 - Part 1: Generic specification_|http://refspecs.freestandards.org/LSB_3.1.0/LSB-Core-generic/LSB-Core-generic.pdf] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc33b9ff-12db-42e1-bc9f-9d3f6d2c60bb"><ac:parameter ac:name="">ISO/IEC 03</ac:parameter></ac:structured-macro> \[ISO/IEC 03\] ISO/IEC. [_Rationale for International Standard --- Programming Languages --- C, Revision 5.10_|http://www.open-std.org/jtc1/sc22/wg14/www/C99RationaleV5.10.pdf]. Geneva, Switzerland: International Organization for Standardization, April 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07951ebc-25b9-45bd-bda0-a5cade2f68fb"><ac:parameter ac:name="">ISO/IEC JTC1/SC22/WG11</ac:parameter></ac:structured-macro> \[ISO/IEC JTC1/SC22/WG11\] ISO/IEC. [_Binding Techniques_|http://www.open-std.org/JTC1/SC22/WG11/] (ISO/IEC JTC1/SC22/WG11), 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c412fa41-4624-486b-a100-43da1caa5345"><ac:parameter ac:name="">ISO/IEC DTR 24732</ac:parameter></ac:structured-macro> \[ISO/IEC DTR 24732\] ISO/IEC JTC1 SC22 WG14 N1290. [Extension for the programming language C to support decimal floating-point arithmetic|http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1290.pdf], March 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1de2539c-6474-4dd6-8822-c4df065a2c5e"><ac:parameter ac:name="">ISO/IEC PDTR 24731-2-2007</ac:parameter></ac:structured-macro> \[ISO/IEC PDTR 24731-2\] [Extensions to the C Library, --- Part II: Dynamic Allocation Functions|http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1248.pdf], August 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17427fc4-3ad2-4008-9353-0aab5374869e"><ac:parameter ac:name="">ISO/IEC PDTR 24772</ac:parameter></ac:structured-macro> \[ISO/IEC PDTR 24772\] ISO/IEC PDTR 24772. _Information Technology_ --- _Programming Languages_ --- [_Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_|http://www.aitcnet.org/isai/_NextMeeting/22-OWGV-N-0134/n0134.pdf], March 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="91805cdb-9441-4ef9-8977-d94268972b0a"><ac:parameter ac:name="">ISO/IEC TR 24731-1-2007</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-1:2007\] ISO/IEC TR 24731. _Extensions to the C Library, --- Part I: Bounds-checking interfaces_. Geneva, Switzerland: International Organization for Standardization, April 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b4b47e9-e9d0-4907-9639-0c018caea7bb"><ac:parameter ac:name="">Jack 07</ac:parameter></ac:structured-macro> \[Jack 07\] Jack, Barnaby. [_Vector Rewrite Attack_|http://www.juniper.net/solutions/literature/white_papers/Vector-Rewrite-Attack.pdf], May 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18e3d1e2-3312-4f4c-939b-7d2e5281bd3a"><ac:parameter ac:name="">Jones 04</ac:parameter></ac:structured-macro> \[Jones 04\] Jones, Nigel. ["Learn a new trick with the offsetof() macro."|http://www.netrino.com/Articles/OffsetOf/index.php] _Embedded Systems Programming_, March 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="662f8013-dcbe-48ad-b7f2-dd91f7124132"><ac:parameter ac:name="">Jones 08</ac:parameter></ac:structured-macro> \[Jones 08\] Jones, Derek M. [The New C Standard: An economic and cultural commentary|http://www.knosof.co.uk/cbook/]. Knowledge Software Ltd., 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="019ff1f2-ce3e-4c72-ab54-f80aa9dcdd61"><ac:parameter ac:name="">Keil 08</ac:parameter></ac:structured-macro> \[Keil 08\] Keil, an ARM Company. "[Floating Point Support|http://www.keil.com/support/man/docs/armlib/armlib_bihbjiea.htm]." _RealView Libraries and Floating Point Support Guide_, 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c2c02cc-f5ab-4187-bf8f-404cc257761c"><ac:parameter ac:name="">Kennaway 00</ac:parameter></ac:structured-macro> \[Kennaway 00\] Kennaway, Kris. [Re: /tmp topic|http://lwn.net/2000/1221/a/sec-tmp.php3], December 2000. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e107ecb9-0b9e-4107-91c3-a4b1d69b988c"><ac:parameter ac:name="">Kernighan 88</ac:parameter></ac:structured-macro> \[Kernighan 88\] Kernighan , Brian W., & Ritchie, Dennis M. _The C Programming Language, 2nd ed._ Englewood Cliffs, NJ: Prentice-Hall, 1988. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1147c7aa-1f95-4e0e-8c3c-7e4407190548"><ac:parameter ac:name="">Kettle 02</ac:parameter></ac:structured-macro> \[Kettlewell 02\] Kettlewell, Richard. [_C Language Gotchas_|http://www.greenend.org.uk/rjk/2001/02/cfu.html], February 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="316d20c9-dfa1-46ee-abe9-546dca5d6469"><ac:parameter ac:name="">Kettle 03</ac:parameter></ac:structured-macro> \[Kettlewell 03\] Kettlewell, Richard. [_Inline Functions In C_|http://www.greenend.org.uk/rjk/2003/03/inline.html], March 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06c75ade-1e3f-448f-9094-f0934e6cd88b"><ac:parameter ac:name="">Kirch-Prinz 02</ac:parameter></ac:structured-macro> \[Kirch-Prinz 02\] Kirch-Prinz, Ulla & Prinz, Peter. _C Pocket Reference_. Sebastopol, CA: O'Reilly, November 2002 (ISBN: 0-596-00436-2). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a8a7e92-b9ee-46a8-9ed9-385e31a8f230"><ac:parameter ac:name="">Klarer 04</ac:parameter></ac:structured-macro> \[Klarer 04\] Klarer, R., Maddock, J., Dawes, B. & Hinnant, H. "Proposal to Add Static Assertions to the Core Language (Revision 3)." ISO C+\+ committee paper ISO/IEC JTC1/SC22/WG21/N1720, October 2004. Available at [http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2004/n1720.html]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78d31cd9-bdd7-4c34-ab03-3dc76c0425b7"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro> \[Klein 02\] Klein, Jack. [_Bullet Proof Integer Input Using strtol()_|http://home.att.net/~jackklein/c/code/strtol.html], 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c37ba7da-f351-4836-a135-0fbffcfd9434"><ac:parameter ac:name="">Koenig 89</ac:parameter></ac:structured-macro> \[Koenig 89\] Koenig, Andrew. _C Traps and Pitfalls_. Addison-Wesley Professional, January 1, 1989. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="418f6a73-936e-491b-a659-d8514dacb393"><ac:parameter ac:name="">Kuhn 06</ac:parameter></ac:structured-macro> \[Kuhn 06\] Kuhn, Markus. [_UTF-8 and Unicode FAQ for Unix/Linux_|http://www.cl.cam.ac.uk/~mgk25/unicode.html], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a02ef79-25a5-4cbc-8f8e-98a3fafddb4f"><ac:parameter ac:name="">Lai 06</ac:parameter></ac:structured-macro> \[Lai 06\] Lai, Ray. "[Reading Between the Lines|http://undeadly.org/cgi?action=article&sid=20061027031811]." _OpenBSD Journal_, October 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32ed8505-8a07-4588-aefc-1ac502aee56a"><ac:parameter ac:name="">Lewis 06</ac:parameter></ac:structured-macro> \[Lewis 06\] Lewis, Richard. "[Security Considerations When Handling Sensitive Data| http://secureapps.blogspot.com/2006/10/security-considerations-when-handling.html]." Posted on the Application Security by Richard Lewis blog October 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c77b1f4-3360-416c-b713-b7ff07132f10"><ac:parameter ac:name="">Linux 07</ac:parameter></ac:structured-macro> \[Linux 07\] [Linux Programmer's Manual|http://www.kernel.org/doc/man-pages/online_pages.html], July 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cd172a6-5d23-4c1c-ab73-40842f91ee09"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro> \[Lions 96\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e86b338e-1620-4b80-98ff-4112a4e9bd61"><ac:parameter ac:name="">Lipson 00</ac:parameter></ac:structured-macro>
\[Lipson 00\] Lipson, Howard & Fisher, David. "Survivability-\--A New Technical and Business Perspective on Security," 33-\--39.- _{-}Proceedings of the 1999 New Security Paradigms Workshop{-}{_}-. Caledon Hills, Ontario, Canada, Sept. 22-\--24, 1999. New York: Association for Computing Machinery, 2000. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7b3b1a4-a788-4913-9192-e8870f8e8893"><ac:parameter ac:name="">Lipson 06</ac:parameter></ac:structured-macro> \[Lipson 06\] Lipson, Howard. _Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks_ (CMU/SEI-2006-TN-027). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db39b0bf-de01-46b3-ab67-3bc661eac0e0"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro> \[Lockheed Martin 05\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="097884b9-e250-4f1b-9e3f-b8e5a723ebd0"><ac:parameter ac:name="">Loosemore 07</ac:parameter></ac:structured-macro> \[Loosemore 07\] Loosemore, Sandra, Stallman, Richard M., McGrath, Roland, Oram, Andrew, & Drepper, Ulrich. [The GNU C Library Reference Manual|http://www.gnu.org/software/libc/manual/], Edition 0.11, September 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9248aa2e-c2ad-4488-9c30-81bed151976f"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 01\] [_flexible array members and designators in C9X_|http://www.usenix.org/publications/login/2001-07/pdfs/mccluskey.pdf] ;login:, July 2001, Volume 26, Number 4, p. 29---32. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a65f2606-d96b-461f-9c3e-cfeb99e41a0d"><ac:parameter ac:name="">Mell 07</ac:parameter></ac:structured-macro> \[Mell 07\] P. Mell, K. Scarfone, and S. Romanosky, "A Complete Guide to the Common Vulnerability Scoring System Version 2.0", FIRST, June 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50d0e188-bb11-4b73-bfce-1bdb36aed39f"><ac:parameter ac:name="">mercy 06</ac:parameter></ac:structured-macro> \[mercy\] mercy. [_Exploiting Uninitialized Data_|http://www.felinemenace.org/papers/UBehavior.zip], January 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50e95b46-951d-403a-944e-0b5f7578a6ee"><ac:parameter ac:name="">Microsoft 03</ac:parameter></ac:structured-macro> \[Microsoft 03\] Microsoft Security Bulletin MS03-026, "[Buffer Overrun In RPC Interface Could Allow Code Execution (823980)|http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx]," September 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f989ff1-179b-4d88-a600-b12c3fc1805e"><ac:parameter ac:name="">Microsoft 07</ac:parameter></ac:structured-macro> \[Microsoft 07\] [C Language Reference|http://msdn2.microsoft.com/en-us/library/fw5abdx6(VS.80).aspx], 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38f2abbd-e27e-4718-a0a7-14d3ebe28e2c"><ac:parameter ac:name="">Miller 04</ac:parameter></ac:structured-macro> \[Miller 04\] Miller, Mark C., Reus, James F., Matzke, Robb P., Koziol, Quincey A., & Cheng, Albert P. "[Smart Libraries: Best SQE Practices for Libraries with an Emphasis on Scientific Computing|https://wci.llnl.gov/codes/smartlibs/UCRL-JRNL-208636.pdf]." _Proceedings of the Nuclear Explosives Code Developer's Conference_, December 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17ff9ae0-00aa-4c8a-89cd-46111b6494bc"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MISRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="873dd11b-9fe6-4486-9eec-90c435a76b04"><ac:parameter ac:name="">MIT 04</ac:parameter></ac:structured-macro> \[MIT 04\] MIT. "[MIT krb5 Security Advisory 2004-002|hhttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt], 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43396c54-94aa-4ff8-8882-27ee1898e0b4"><ac:parameter ac:name="">MIT 05</ac:parameter></ac:structured-macro> \[MIT 05\] MIT. "[MIT krb5 Security Advisory 2005-003|http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-recvauth.txt], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6e53114-a6eb-4f31-bcf7-d4e08db7497f"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro> \[MITRE 07\] MITRE. [Common Weakness Enumeration, Draft 9|http://cwe.mitre.org/], April 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f0df839-524c-4f7c-8588-c4547d721782"><ac:parameter ac:name="">MSDN</ac:parameter></ac:structured-macro> \[MSDN\] [Microsoft Developer Network|http://msdn.microsoft.com/en-us/default.aspx]. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f18a59e6-2da5-4b92-8c3a-e2300b935f84"><ac:parameter ac:name="">Murenin 07</ac:parameter></ac:structured-macro> \[Murenin 07\] Murenin, Constantine A. "[cnst: 10-year-old pointer-arithmetic bug in make(1) is now gone, thanks to malloc.conf and some debugging|http://cnst.livejournal.com/24040.html]," June 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85d14cb0-ee09-4b30-925d-ccb9e38a6c9a"><ac:parameter ac:name="">NAI 98</ac:parameter></ac:structured-macro> \[NAI 98\] Network Associates Inc. [Bugtraq: Network Associates Inc. Advisory (OpenBSD)|http://seclists.org/bugtraq/1998/Aug/0071.html], 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7080daef-a242-429a-8497-a67dbc4f2e99"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA Glenn Research Center, Office of Safety Assurance Technologies. [_NASA Software Safety Guidebook_|http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] (NASA-GB-1740.13). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="465c2022-8baf-4ce4-9d20-5ca6d999e63d"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb9d63b3-7d30-4473-84de-9d9e3e32bcd7"><ac:parameter ac:name="">NIST 06b</ac:parameter></ac:structured-macro> \[NIST 06b\] NIST. [DRAFT Source Code Analysis Tool Functional Specification. | http://samate.nist.gov/docs/SAMATE_source_code_analysis_tool_spec_09_15_06.pdf] NIST Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, September 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4196b618-d234-4bf6-9a79-d4549619adda"><ac:parameter ac:name="">OpenBSD</ac:parameter></ac:structured-macro> \[OpenBSD\] Berkley Software Design, Inc. [Manual Pages|http://www.openbsd.org/cgi-bin/man.cgi], June 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9ccc380-7075-49c3-bae8-3c010a913422"><ac:parameter ac:name="">Open Group 97a</ac:parameter></ac:structured-macro> \[Open Group 97a\] The Open Group. [_The Single UNIX® Specification, Version 2_|http://www.opengroup.org/onlinepubs/7990989775/toc.htm], 1997. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c171639c-abd3-4a28-a5c2-34ca1fa72ceb"><ac:parameter ac:name="">Open Group 97b</ac:parameter></ac:structured-macro> \[Open Group 97b\] The Open Group. [_Go Solo 2---The Authorized Guide to Version 2 of the Single UNIX Specification_|http://www.unix.org/whitepapers/64bit.html], May 1997. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4af21764-d048-4693-bbb6-36d79d55d55c"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro> \[Open Group 04\] The Open Group and the IEEE. [_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm], 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9455f5c-37a2-4def-aed8-3301536943ed"><ac:parameter ac:name="">OWASP Double Free</ac:parameter></ac:structured-macro> \[OWASP Double Free\] Open Web Application Security Project, "[Double Free|http://www.owasp.org/index.php/Double_Free]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4a95935-1ce5-48f6-a5d8-2377eab896d6"><ac:parameter ac:name="">OWASP Freed Memory</ac:parameter></ac:structured-macro> \[OWASP Freed Memory\] Open Web Application Security Project, "[Using freed memory|http://www.owasp.org/index.php/Using_freed_memory]." |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1592276-66ef-45ba-bb5f-5e971c843fce"><ac:parameter ac:name="">Pethia 03</ac:parameter></ac:structured-macro> \[Pethia 03\] Pethia, Richard D. "[Viruses and Worms: What Can We Do About Them?|http://www.cert.org/congressional_testimony/Pethia-Testimony-9-10-2003/]" September 10, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8a84032-3cb2-4b43-964d-af5df4eedb8f"><ac:parameter ac:name="">Pfaff 04</ac:parameter></ac:structured-macro> \[Pfaff 04\] Pfaff, Ken Thompson. "[Casting (time_t)(-1)|http://groups.google.com/group/comp.lang.c/browse_thread/thread/8983d8d729244f2b/ea0e2972775a1114?#ea0e2972775a1114]." _Google Groups comps.lang.c_, March 2, 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97ccc861-a0e1-4337-aa49-a6c111c703c2"><ac:parameter ac:name="">Pike 93</ac:parameter></ac:structured-macro> \[Pike 93\] Pike, Rob & Thompson, Ken. "Hello World." _Proceedings of the USENIX Winter 1993 Technical Conference_, San Diego, CA, January 25-\--29, 1993, pp. 43-\--50. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a20791ea-5327-4422-a276-858a2b62c128"><ac:parameter ac:name="">Plakosh 05</ac:parameter></ac:structured-macro> \[Plakosh 05\] Plakosh, Dan. [_Consistent Memory Management Conventions_|https://buildsecurityin.us-cert.gov/daisy/bsi/articles/knowledge/coding/476.html], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2653b911-9ddc-41d7-8448-903c0190cdcb"><ac:parameter ac:name="">Plum 85</ac:parameter></ac:structured-macro> \[Plum 85\] Plum, Thomas. _Reliable Data Structures in C_. Kamuela, HI: Plum Hall, Inc., 1985 (ISBN 0-911537-04-X). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33afecb3-9ab4-43e5-baba-0ac488278cb2"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas, & Saks, Dan. _C Programming Guidelines, 2nd ed_. Kamuela, HI: Plum Hall, 1989 (ISBN 0911537074). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35dd024a-8c12-4d5e-99c2-d85ea518bb33"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, 1991 (ISBN 0911537104). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92dceb5e-6d4b-4e64-a73a-a4830777e960"><ac:parameter ac:name="">Plum 08</ac:parameter></ac:structured-macro> \[Plum 08\] Plum, Thomas. Static Assertions. June, 2008. [http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1330.pdf] |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1430f8e4-bbd6-4a53-b4f0-c1568310c1e3"><ac:parameter ac:name="">Redwine 06</ac:parameter></ac:structured-macro> \[Redwine 06\] Redwine, Samuel T., Jr., ed. _Secure Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.1_. U.S. Department of Homeland Security, September 2006. See [Software Assurance Common Body of Knowledge|https://buildsecurityin.us-cert.gov/daisy/bsi/resources/dhs/95.html] on Build Security In. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bd24564-35ef-4a2e-9b5a-c6ac8a412254"><ac:parameter ac:name="">RUS-CERT</ac:parameter></ac:structured-macro> \[RUS-CERT\] RUS-CERT Advisory 2002-08:02, "[Flaw in calloc and similar routines|http://cert.uni-stuttgart.de/advisories/calloc.php]," 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e1b98b4-562f-49c3-81ec-c1b5fd654e64"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 74\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ad97b91-aa11-4503-875b-d09bed1781d0"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 75\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6a7909f-e5c3-4ef9-9c83-9248128bf571"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro> \[Saks 99\] Saks, Dan. "[const T vs.T const|http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]." _Embedded Systems Programming_, February 1999, pp. 13-16. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10c333a9-2247-4e53-8847-f474e9ec1689"><ac:parameter ac:name="">Saks 00</ac:parameter></ac:structured-macro> \[Saks 00\] Saks, Dan. "[Numeric Literals|http://www.embedded.com/2000/0009/0009pp.htm]." _Embedded Systems Programming_, September 2000. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f038b5d-d7f3-4eda-a385-70a16dda898e"><ac:parameter ac:name="">Saks 01a</ac:parameter></ac:structured-macro> \[Saks 01a\] Saks, Dan. "[Symbolic Constants|http://www.embedded.com/story/OEG20011016S0116]." _Embedded Systems Design_, November 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea67e832-7d12-4e34-b530-0f3b2f32d2e0"><ac:parameter ac:name="">Saks 01b</ac:parameter></ac:structured-macro> \[Saks 01b\] Saks, Dan. "[Enumeration Constants vs. Constant Objects|http://www.embedded.com/columns/programmingpointers/9900402]." _Embedded Systems Design_, November 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9cf2447-5678-4b69-bcd9-6343f07f4eef"><ac:parameter ac:name="">Saks 02</ac:parameter></ac:structured-macro> \[Saks 02\] Saks, Dan. "[Symbolic Constant Expressions|http://www.embedded.com/story/OEG20020124S0117]." _Embedded Systems Design_, February 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e278234-501b-40e7-9108-fd7252a8c450"><ac:parameter ac:name="">Saks 05</ac:parameter></ac:structured-macro> \[Saks 05\] Saks, Dan. "[Catching Errors Early with Compile-Time Assertions|http://www.embedded.com/columns/programmingpointers/164900888?_requestid=287187]." _Embedded Systems Design_, June 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e384a100-9887-47e5-9494-f27954fc0a41"><ac:parameter ac:name="">Saks 07a</ac:parameter></ac:structured-macro> \[Saks 07a\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" _Embedded Systems Design_, July 1, 2002. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a44692a-87d2-4fba-be8a-4dc2ecfffb71"><ac:parameter ac:name="">Saks 07b</ac:parameter></ac:structured-macro> \[Saks 07b\] Saks, Dan. [Bail, return, jump, or . . . throw?|http://www.embedded.com/columns/programmingpointers/197008821]. _Embedded Systems Design_, March 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="383fa792-8e1e-468e-8e82-43e7eaee5c8c"><ac:parameter ac:name="">Saks 08</ac:parameter></ac:structured-macro> \[Saks 08\] Saks, Dan, & Dewhurst, Stephen C. "Sooner Rather Than Later: Static Programming Techniques for C++" (presentation, March 2008). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="673fcedb-1e14-48c1-bdc0-9759ba12583e"><ac:parameter ac:name="">Schwarz 05</ac:parameter></ac:structured-macro> \[Schwarz 05\] Schwarz, B., Wagner, Hao Chen, Morrison, D., West, G., Lin, J., & Tu, J. Wei. "Model checking an entire Linux distribution for security violations." _Proceedings of the 21st Annual Computer Security Applications Conference_, December 2005 (ISSN 1063-9527; ISBN 0-7695-2461-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fb9c667-4cef-4d91-8363-7728b927ffd1"><ac:parameter ac:name="">Seacord 03</ac:parameter></ac:structured-macro> \[Seacord 03\] Seacord, Robert C., Plakosh, Daniel, & Lewis, Grace A. [_Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices_|http://www.informit.com/store/product.aspx?isbn=0321118847]. Addison-Wesley, February 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2d71565-4952-47d4-b33b-2cb4ab2426b0"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b63f5775-6dfd-4a8d-8a79-6c4a2b06872f"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 05a\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b0e2480-3c9b-4062-8c72-d0f6ee9fcaf5"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro> \[Seacord 05b\] Seacord, Robert C. "Managed String Library for C, C/C++." _Users Journal_ _23_, 10 (October 2005): 30---34. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52ecbd24-187c-4a21-a9c1-4c45a9b47cbf"><ac:parameter ac:name="">Seacord 05c</ac:parameter></ac:structured-macro> \[Seacord 05c\] Seacord, Robert C. [_Variadic Functions: How they contribute to security vulnerabilities and how to fix them_|http://www.cert.org/books/secure-coding/LWM%203-11%20%28Seacord%29.pdf]. _Linux World Magazine_, November 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61bc7fd7-032b-4b25-aece-afb4a3ea80bd"><ac:parameter ac:name="">Secunia</ac:parameter></ac:structured-macro> \[Secunia\] Secunia Advisory SA10635, "[HP-UX calloc Buffer Size Miscalculation Vulnerability|http://secunia.com/advisories/10635/]," 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="919d9b97-e40f-45b8-8ae8-34481b811f4d"><ac:parameter ac:name="">SecurityFocus 07</ac:parameter></ac:structured-macro> \[SecurityFocus 07\] SecurityFocus. "[Linux Kernel Floating Point Exception Handler Local Denial of Service Vulnerability|http://www.securityfocus.com/bid/10538/discuss]," 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddee0231-4612-4b19-bd41-6a970add458f"><ac:parameter ac:name="">SecuriTeam 07</ac:parameter></ac:structured-macro> \[SecuriTeam 07\] SecuriTeam. "[Microsoft Visual C+\+ 8.0 Standard Library Time Functions Invalid Assertion DoS (Problem 3000)|http://www.securiteam.com/windowsntfocus/5MP0D0UKKO.html]," February 13, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="858d0e93-74d6-4013-ae52-cfd5d88330c9"><ac:parameter ac:name="">Sloss 04</ac:parameter></ac:structured-macro> \[Sloss 04\] Sloss, Andrew, Symes, Dominic, & Wright, Chris. [_ARM System Developer's Guide_|http://www.arm.com/documentation/books/4975.html]. San Francisco:Elsevier/Morgan Kauffman, 2004 (ISBN-10: 1558608745; ISBN-13: 978-1558608740). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4810549b-0879-442b-b055-8f90fc69ca8e"><ac:parameter ac:name="">Spinellis 06</ac:parameter></ac:structured-macro> \[Spinellis 06\] Spinellis, Diomidis. [_Code Quality: The Open Source Perspective_|http://www.spinellis.gr/codequality]. Addison-Wesley, 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9386c00f-1cf1-4acb-a4d3-cde50ed05143"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro> \[Steele 77\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb686cf0-a1e2-4cfb-9e2b-0352f8ff20ae"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d18e4876-fefb-4b90-95ad-111117a75dbf"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro> \[Summit 05\] Summit, Steve. [_comp.lang.c Frequently Asked Questions_|http://c-faq.com/], 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63ad1ac4-baa6-448b-a451-41a14323ba0f"><ac:parameter ac:name="">Sun</ac:parameter></ac:structured-macro> \[Sun\] [Sun Security Bulletin #00122|http://sunsolve.sun.com/search/document.do?assetkey=1-22-00122-1], 1993. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05959faf-2b1c-4341-acf0-ed382ad604ec"><ac:parameter ac:name="">Sun 05</ac:parameter></ac:structured-macro> \[Sun 05\] [C User's Guide|http://docs.sun.com/source/819-3688/]. 819-3688-10. Sun Microsystems, Inc., 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20a69c6c-ef69-4c58-91a3-264c4371128b"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro> \[Sutter 04\] Sutter, Herb & Alexandrescu, Andrei. C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices. Boston, MA:Addison-Wesley Professional, 2004 (ISBN 0321113586). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e1d369e-ae04-4ba8-8043-bd4a84b3a4bb"><ac:parameter ac:name="">van de Voort 07</ac:parameter></ac:structured-macro> \[van de Voort 07\] van de Voort, Marco. [Development Tutorial (a.k.a Build FAQ)|http://www.stack.nl/~marcov/buildfaq.pdf], January 29, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93cb2e70-bfb7-4050-81ad-190e10914f2d"><ac:parameter ac:name="">van Sprundel06</ac:parameter></ac:structured-macro> \[van Sprundel 06\] van Sprundel, Ilja. [Unusualbugs|http://ilja.netric.org/files/Unusual%20bugs.pdf], 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef92a1e4-89fc-405e-a066-e01478196b98"><ac:parameter ac:name="">Viega 01</ac:parameter></ac:structured-macro> \[Viega 01\] Viega, John. [Protecting Sensitive Data in Memory|http://www.cgisecurity.com/lib/protecting-sensitive-data.html], February 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7304d06-18a7-46d1-86d5-814f9210b8ea"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro> \[Viega 03\] Viega, John, & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b57465a-4d17-43a7-8bf4-e04342fd308c"><ac:parameter ac:name="">Viega 05</ac:parameter></ac:structured-macro> \[Viega 05\] Viega, John. [CLASP Reference Guide Volume 1.1.|http://www.securesoftware.com/process/] Secure Software, 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="233ff23e-cc3c-45bf-a5bb-313478e8bef8"><ac:parameter ac:name="">VU#159523</ac:parameter></ac:structured-macro> \[VU#159523\] Giobbi, Ryan. Vulnerability Note [VU#159523|http://www.kb.cert.org/vuls/id/159523], _Adobe Flash Player integer overflow vulnerability_, April 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95f6c757-592e-41de-a0c5-7ae125e93898"><ac:parameter ac:name="">VU#162289</ac:parameter></ac:structured-macro> \[VU#162289\] Dougherty, Chad. Vulnerability Note [VU#162289|http://www.kb.cert.org/vuls/id/162289], _gcc silently discards some wraparound checks_, April 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1ab79cc-e381-4567-83d4-e88bf1c6fa46"><ac:parameter ac:name="">VU196240</ac:parameter></ac:structured-macro> \[VU#196240\] Taschner, Chris & Manion, Art. Vulnerability Note [VU#196240|http://www.kb.cert.org/vulnotes/id/196240], _Sourcefire Snort DCE/RPC preprocessor does not properly reassemble fragmented packets_, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbd4da43-67fb-4a49-b016-fdf78dab4bdd"><ac:parameter ac:name="">VU286468</ac:parameter></ac:structured-macro> \[VU#286468\] Burch, Hal. Vulnerability Note [VU#286468|http://www.kb.cert.org/vulnotes/id/286468], _Ettercap contains a format string error in the "curses_msg()" function_, 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4a2694a-2257-4555-a3bd-568b9affd98b"><ac:parameter ac:name="">VU439395</ac:parameter></ac:structured-macro> \[VU#439395\] Lipson, Howard. Vulnerability Note [VU#439395|http://www.kb.cert.org/vuls/id/439395], _Apache web server performs case sensitive filtering on Mac OS X HFS\+ case insensitive filesystem,_ 2001. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63987f54-f5de-4075-92f2-e700301c3bb6"><ac:parameter ac:name="">VU551436</ac:parameter></ac:structured-macro> \[VU#551436\] Giobbi, Ryan. Vulnerability Note [VU#551436|http://www.kb.cert.org/vulnotes/id/551436], _Mozilla Firefox SVG viewer vulnerable to buffer overflow,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b08f3ec-1e9a-4ae8-8eee-7ed87a28acce"><ac:parameter ac:name="">VU568148</ac:parameter></ac:structured-macro> \[VU#568148\] Finlay, Ian A. & Morda, Damon G. Vulnerability Note [VU#568148|http://www.kb.cert.org/vulnotes/id/568148], _Microsoft Windows RPC vulnerable to buffer overflow_, 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d58f52c-99da-450f-9edb-ccc6f9b3f1ae"><ac:parameter ac:name="">VU623332</ac:parameter></ac:structured-macro> \[VU#623332\] Mead, Robert. Vulnerability Note [VU#623332|http://www.kb.cert.org/vuls/id/623332], _MIT Kerberos 5 contains double free vulnerability in "krb5_recvauth()" function,_ 2005. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d990a1d-4ea1-4315-9fea-4f291d682653"><ac:parameter ac:name="">VU649732</ac:parameter></ac:structured-macro> \[VU#649732\] Gennari, Jeff. Vulnerability Note [VU#649732|http://www.kb.cert.org/vulnotes/id/649732], _Samba AFS ACL Mapping VFS Plug-In Format String Vulnerability,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c2e26e5-7b8a-4481-9e72-eed508908e6b"><ac:parameter ac:name="">VU654390</ac:parameter></ac:structured-macro> \[VU#654390\] Rafail, Jason A. Vulnerability Note [VU#654390|https://www.kb.cert.org/vulnotes/id/654390], _ISC DHCP contains C Includes that define vsnprintf() to vsprintf() creating potential buffer overflow conditions_, June 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a1c887b-3338-41d8-ba76-ae103ce237e2"><ac:parameter ac:name="">VU743092</ac:parameter></ac:structured-macro> \[VU#743092\] Rafail, Jason A. & Havrilla, Jeffrey S. Vulnerability Note [VU#743092|https://www.kb.cert.org/vulnotes/id/743092], _realpath(3) function contains off-by-one buffer overflow,_ July 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e8635dd-50f2-43ea-bc81-5e96b0574c4c"><ac:parameter ac:name="">VU834865</ac:parameter></ac:structured-macro> \[VU#834865\] Gennari, Jeff. Vulnerability Note [VU#834865|http://www.kb.cert.org/vuls/id/834865], _Sendmail signal I/O race condition_, March 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01b7665f-0732-412c-aeb0-56457b10fdc5"><ac:parameter ac:name="">VU837857</ac:parameter></ac:structured-macro> \[VU#837857\] Dougherty, Chad. Vulnerability Note [VU#837857|http://www.kb.cert.org/vuls/id/837857], _SX.Org server fails to properly test for effective user ID_, August 2006. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b84bd78-8c17-47da-9cc3-f2929acd175a"><ac:parameter ac:name="">VU881872</ac:parameter></ac:structured-macro> \[VU#881872\] Manion, Art & Taschner, Chris. Vulnerability Note [VU#881872|http://www.kb.cert.org/vulnotes/id/881872], _Sun Solaris telnet authentication bypass vulnerability,_ 2007. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e15b851-14c5-475a-9470-bc41f7809eb9"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Warren, Henry S. [_Hacker's Delight_|http://www.hackersdelight.org/]. Boston, MA: Addison Wesley Professional, 2002 (ISBN 0201914654). |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01e918d6-df88-4196-b6e4-4ae603ee0aa2"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] Wheeler, David. [Secure Programming for Linux and Unix HOWTO, v3.010|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/], March 2003. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8b25a77-d534-4761-ad94-13c8ba3aa618"><ac:parameter ac:name="">Wheeler 04</ac:parameter></ac:structured-macro> \[Wheeler 04\] Wheeler, David. [_Secure programmer: Call components safely_|http://www-128.ibm.com/developerworks/linux/library/l-calls.html]. December 2004. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="add444dc-3c5d-4d7e-aa0d-9d7501438730"><ac:parameter ac:name="">Wojtczuk 08</ac:parameter></ac:structured-macro> \[Wojtczuk 08\] Wojtczuk, Rafal. "[Analyzing the Linux Kernel vmsplice Exploit|http://www.avertlabs.com/research/blog/index.php/2008/02/13/analyzing-the-linux-kernel-vmsplice-exploit/]." McAfee Avert Labs Blog, February 13, 2008. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a535e65-fe6a-45a5-86f1-e0fbd7ecf001"><ac:parameter ac:name="">Yergeau 98</ac:parameter></ac:structured-macro> \[Yergeau 98\] Yergeau, F. [RFC 2279 - UTF-8, a transformation format of ISO 10646|http://www.faqs.org/rfcs/rfc2279.html], January 1998. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63833773-b1a4-42aa-9277-ce6729131f14"><ac:parameter ac:name="">Zalewski 01</ac:parameter></ac:structured-macro> \[Zalewski 01\] Zalewski, Michal. [_Delivering Signals for Fun and Profit: Understanding, exploiting and preventing signal-handling related vulnerabilities_|http://lcamtuf.coredump.cx/signals.txt], May 2001. |