Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="121db18b940efbde-8a6f8853-418240c2-b8a0bf3b-f32485ea048201e440ce08f8"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
\[Burch 06\] Hal Burch, Fred Long, Robert Seacord.  Specifications for Managed Strings. May 2006.  CMU/SEI-2006-TR-006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d08a7ce881aa218-896e98c5-4a8d407d-bc9190e2-459708bcc84d16588a2dd3a6"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro>
\[CERT 06\] CERT. [Managed String Library|http://www.cert.org/secure-coding/managedstring.html] (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da03fcab34eb358e-08f7be19-433d42a1-8e61bbfd-a36ceab33e8a278f7d4b7183"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
\[Graf 03\] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b884ac053e9115b2-7c04d5c3-49334510-93acb1d9-0a1dfff3719673957f5f6572"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
\[Hatton 04\] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec4fc88974a57cd9-984367db-4dee4646-bbaa8733-1817592c9d288d08e7f58228"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. Programming Languages --- C, Second Edition, 1999.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="828b861cf1576e8b-b677e91d-4c614d37-a136bcc1-81bae63871294f43800a55b0"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
\[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. Extensions to the C Library, --- Part I: Bounds-checking interfaces. April, 2006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f166cdd90cc07fe1-1646c40d-4dae43a5-82f0a9a9-a18dc52c4a94a4494888e234"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
\[Kerrighan 88\] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9ef6e583cf7104a-96e8f226-47714c2e-b33e954e-3e878053e3d05ea97de61281"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro>
\[Klein 02\] Klein, Jack. _Bullet Proof Integer Input Using strtol()_. [http://home.att.net/~jackklein/c/code/strtol.html] (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7519de46de90eabd-e5c7f884-47f44a9d-91528b5b-f958f0d33ad9b5830b7bee95"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
\[mercy\] mercy. _Exploiting Uninitialized Data_. [http://www.felinemenace.org/papers/UBehavior.zip] (January 2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32efe276f8d340d7-9979c888-46554374-b90297d4-828c3479dfe64cbbbc449b9a"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
\[MISRA 04\] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db60d2d37aec5a31-68d8983f-4c9c439b-a0cebf91-f6da7324a269b5134813b0c5"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
\[NASA-GB-1740.13\] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. [http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc]

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22c1cc0b111e123f-972b89f9-4a1948ad-ad7cb8ae-8298abe658192c7ad9971b44"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
\[NIST 06\] NIST. SAMATE Reference Dataset (SRD).See [http://samate.nist.gov/SRD/srdFiles/]

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df0adfbebdfcedbe-d193cfd4-45664a62-859496d4-a543cc83a391f5f3a44ef588"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
\[Plum 89\] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59a4fb3319ca6b7c-3ce91c65-45b94bbb-989b9823-0af449a0e17eb5b5f092337f"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
\[Plum 91\] Thomas Plum, Dan Saks. C+\+ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="232cd517e78a1d9f-fb65385a-4845422d-acf69a85-dac4b97a17578e7ca99d685d"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ce08f25e8a9c260-4860d994-45c34996-b7d08a19-6c8c87ecced3a0c12bec13a3"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
\[Seacord 05a\] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e86b3df53ef5f022-e9202aa4-429b4fe4-a4cb9ede-f1f2fed4c18c2d37f61d6e13"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
\[Seacord 05b\] Seacord, R. Managed String Library for C. C/C+\+ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e218a2ca2ca52a7c-e324b4de-47274269-b32ca8cf-c60f36e138cccfb1ad72dad5"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
\[Summit 95\] Summit, Steve. _C Programming FAQs: Frequently Asked Questions_. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4ed946471a9f88d-ba1ecdee-40bb44aa-a312b6d6-aeb5be4205ec6953620d339a"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
\[Summit 05\] Summit, Steve. _comp.lang.c Frequently Asked Questions_. [http://c-faq.com/] (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f0d66cf-f090-47dc-b779-10ba71ba8f89"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>
\[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c60dd23-cc13-493b-8952-cc7f7044cf5191668682-e2f9-491a-952c-aac5d71f6bd4"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
\[Warren 02\] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.