...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
[Dewhurst 0302] | Gotcha #39, "Casting Incomplete Types" |
[ISO/IEC 14882-2014] | Subclause 4.10, "Pointer Conversions" |
[Sutter 00] | "Compiler Firewalls and the Pimpl Idiom" |
...