Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Wiki Markup
Automated detection is not feasible in the fully general case. However, an approach similar to Design Fragments \[[Fairbanks 07|AA. Bibliography#Fairbanks 07]\] could assist both programmers and static analysis tools.

Related

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

MITRE CWE

CWE ID 111, "Direct Use of Unsafe JNI"

Secure Coding Guidelines for the Java Programming Language, Version 3.0

Guideline 3-3 Define wrappers around native methods

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="94a1b7bf293bbb8a-aff2814c-4d3c4e6f-849dba6f-334310b325bfe10c3ae88ac4"><ac:plain-text-body><![CDATA[

[[Fairbanks 2007

AA. Bibliography#Fairbanks 07]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bda54f9dd603eadf-15d922ba-4aa1479e-8fa9b8eb-641c926edd6a818ff55f86b6"><ac:plain-text-body><![CDATA[

[[JNI 2006

AA. Bibliography#JNI 06]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2d31d7cb1eaa940e-56f91919-430940ed-8fc781b2-a816d3104d8fccfb240fe359"><ac:plain-text-body><![CDATA[

[[Liang 1997

AA. Bibliography#Liang 97]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="03d5311b1b17103d-69a74c4f-4f974b3f-91e0bec5-aec87bc9a7de8c45b8faebde"><ac:plain-text-body><![CDATA[

[[Macgregor 1998

AA. Bibliography#Macgregor 98]]

Section 2.2.3, Interfaces and Architectures

]]></ac:plain-text-body></ac:structured-macro>

...