[Abrahams 2010] Abrahams, David.
Error and Exception Handling, #7. Boost Library. 2010.
http://www.boost.org/community/error_handling.html [Banahan 2003] Banahan, Mike.
The C Book. 2003.
[Barney 2010] Barney, Blaise.
POSIX Threads Programming, . Lawrence Livermore National Security, LLC
, . 2010.
[Becker 2008] Becker, Pete.
Working Draft, Standard for Programming Language C++, . April 2008.
[Becker 2009] Becker, Pete
Working Draft, Standard for Programming Language C++, September 2009.
[Black 2007] Paul E. Black, Michael Kass, Michael Koo.
Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007.
http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf[Cline 2009] Cline, Marshall. C++ FAQ Lite - Frequently Asked Questions, 1991-2009.
Anchor |
---|
| codesourcery 2016a |
---|
| codesourcery 2016a |
---|
|
[CodeSourcery 2016a] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al.
Itanium C++ ABI. [Accessed 2016]
https://mentorembedded.github.io/cxx-abi/abi.html Anchor |
---|
| codesourcery2016b |
---|
| codesourcery2016b |
---|
|
[CodeSourcery 2016b] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al.
Itanium C++ ABI ($Revision: 1,86 $). [Accessed 2016]
https://refspecs.linuxbase.org/cxxabi-1.86.html#array-cookies[Coverity 2007]
Coverity Prevent User's Manual (3.3.0). 2007.
...
[Rohlf 2009] Rohlf, Chris.
Fun with erase (). 2009. http://em386.blogspot.com/2009/06/fun-with-erase.html. 2009.[Saks 1999] Dan Saks.
const T vs.T const. Embedded Systems Programming. Pg. 13-16. February 1999
. http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf[Saks 2007] Saks, Dan. "
Sequence Points" Embedded Systems Design, 07/01/02.
...
[VU#623332] Mead, Robert.
Vulnerability Note VU#623332. MIT Kerberos 5 contains double free vulner-ability in "krb5_recvauth()" function. July 2005.
http://www.kb.cert.org/vuls/id/623332[VU#925211] Weimer, Florian.
Vulnerability Note VU#925211. Debian and Ubuntu OpenSSL packages contain a predictable random number generator. May 2008
. http://www.kb.cert.org/vuls/id/925211[Warren 2002] Warren, Henry S.
Hacker's Delight. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).
...
[xorl 2009] xorl.
xorl %eax, %eax. December 2016 [accessed].
...