Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Automated detection of violations of this rule is straightforward. Automated determination of cases where method hiding is unavoidable is infeasible. However, determining whether all invocations of hiding or hidden methods explicitly indicate which specific method is invoked is straightforward.

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="067951738e47a0ff-30e3eba2-40114527-b0c1be3b-bba1af9beaba4853edfca21a"><ac:plain-text-body><![CDATA[

[[Bloch 2005

AA. Bibliography#Bloch 05]]

Puzzle 48: All I Get Is Static

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="72bcf64537a4ad50-21b4ada0-4b9f4f0e-b49c9be4-5ceba1956e393f9745a20d86"><ac:plain-text-body><![CDATA[

[[JLS 2005

AA. Bibliography#JLS 05]]

["8.4.8.2 Hiding (by Class Methods)"

http://java.sun.com/docs/books/jls/third_edition/html/classes.html#8.4.8.2]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="849db3806ee34d8f-84f22633-41614362-8f2ca73f-ed31d399c67620062665849e"><ac:plain-text-body><![CDATA[

[[Tutorials 2008

AA. Bibliography#Tutorials 08]]

[Overriding and Hiding Methods

http://java.sun.com/docs/books/tutorial/java/IandI/override.html]

]]></ac:plain-text-body></ac:structured-macro>

...