[Acton 2006] Acton, Mike. "
Understanding Strict Aliasing."
CellPerformance, June 1, 2006.
[Aho 1986] Aho, Alfred V.; Sethi, Ravi; Ullman, Jeffrey D. "Compilers: Principles, Techniques, and Tools" (2nd ed.), 1986.
[Apiki 2006] Apiki, Steve. "
Lock-Free Programming on AMD Multi-Core System."
AMD Developer Central, 2006.
...
[Bailey 2014] Bailey, Don A
.,.
Raising Lazarus - The Lazarus—The 20 Year Old Bug that Went to Mars . 2014.[Banahan 2003] Banahan, Mike.
The C Book . 2003.
...
[Black 2007] Black, Paul E.
, ; Kass, Michael
, ; & Koo, Michael.
Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007
. http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf.
Anchor |
---|
| Brainbell.com |
---|
| Brainbell.com |
---|
|
[Brainbell.com] Brainbell.com.
Advice and Warnings for C Tutorials .
[Bryant 2003] Bryant, Randal E.
, & O'Halloran, David.
Computer Systems: A Programmer's Perspective. Upper Saddle River, NJ: Prentice Hall, 2003 (ISBN 0-13-034074-X).
[Burch 2006] Burch, Hal
, ; Long, Fred
, ; & Seacord, Robert C.
Specifications for Managed Strings (CMU/SEI-2006-TR-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006.
...
[C99 Rationale 2003]
Rationale for International Standard—Programming Languages—C, Revision 5.10 (C99 Rationale), April 2003.
http://www.open-std.org/jtc1/sc22/wg14/www/C99RationaleV5.10.pdf.[Callaghan 1995] Callaghan, B
., ; Pawlowski, B.
, ; & Staubach, P.
IETF RFC 1813 NFS Version 3 Protocol Specification, June 1995.
...
[Chen 2002] Chen, H.
, ; Wagner, D.
, ; & Dean, D.
Setuid Demystified. USENIX Security Symposium, 2002.
...
[DHS 2006] U.S. Department of Homeland Security.
Build Security In. 2006.
[DISA
20082015] DISA.
Application Security and Development Security Technical Implementation Guide, Version 23, Release 1. July 200810. Accessed April 2015.
Anchor |
---|
| DISA 2016 |
---|
| DISA 2016 | DOD 5220 | DOD 5220 |
---|
|
[
DOD 5220DISA 2016]
DISA. Application Security and Development Security Technical Implementation Guide, Version 4, Release 1. Accessed January 2017.[DISA 2018] DISA. Application Security and Development Security Technical Implementation Guide, Version 4, Release 8. Accessed January 2019.[DOD 5220] U.S. Department of Defense. DoD Standard 5220.22 U.S. Department of Defense. DoD Standard 5220.22-M (Word document).
[Dowd 2006] Dowd, M.
, ; McDonald, J.
, ; & Schuh, J.
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Boston: Addison-Wesley, 2006.
See http://taossa.com for updates and errata.[Drepper 2006] Drepper, Ulrich.
Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong). May 3, 2006.
...
[Feather 1997] Feather, Clive, D. W.
Solving the struct Hack Problem. JTC1/SC22/WG14 N791
. http://www. open-std.org/jtc1/sc22/wg14/www/docs/n791.htm (1997).
[Finlay 2003] Finlay, Ian A. CERT Advisory CA-2003-16,
Buffer Overflow in Microsoft RPC. CERT/CC, July 2003.
[Fisher 1999] Fisher,
David, David & Lipson, Howard. "Emergent Algorithms—A New Method for Enhancing Survivability in Unbounded Systems."
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32). Maui, HI, January 5–8, 1999.
...
[Fortify 2006] Fortify Software Inc.
Fortify Taxonomy: Software Security Errors. 2006.
[Fomichev 2016] Fomichev, Roman. "Safe Clearing of Private Data". PVS-Studio Team, 2016.[FSF 2005] Free Software Foundation.
GCC Online Documentation. 2005.
[Garfinkel 1996] Garfinkel,
Simson, Simson & Spafford, Gene.
Practical UNIX & Internet Security, 2nd ed. Sebastopol, CA: O'Reilly Media, April 1996 (ISBN 1-56592-148-8).
[GCC Bugs] GCC Team.
GCC Bugs.
Copyright © Free Software Foundation, Inc. http://gcc.gnu.org/bugs/#nonbugs_c (n.d.).[GNU 2010] GNU.
Coding Standards. GNU, 2010.
...
[Goodin 2009]
Goodin, Dan
Goodin.
Clever Attack Exploits Fully-Patched Linux Kernel.
The Register, July 2009.
[Gough 2005] Gough, Brian J.
An Introduction to GCC. Network Theory Ltd
., Revised August 2005 (ISBN 0-9541617-9-3).
[Graff 2003] Graff, Mark G.
, & Van Wyk, Kenneth R.
Secure Coding: Principles and Practices. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).
...
[Griffiths 2006] Griffiths, Andrew.
Clutching at Straws: When You Can Shift the Stack Pointer. 2006.
[Gutmann 1996] Gutmann, Peter.
Secure Deletion of Data from Magnetic and Solid-State Memory. July 1996.
[Haddad 2005] Haddad, Ibrahim.
"Secure Coding in C and C++: An Interview with Robert Seacord, Senior Vulnerability Analyst at CERT." Linux World Magazine, November 2005.
...
[Henricson 1992] Henricson, Mats
, & Nyquist, Erik.
Programming in C++, Rules and Recommendations. Ellemtel Telecommunication Systems Laboratories, 1992.
...
[Howard 2002] Howard, Michael
, & LeBlanc, David C.
Writing Secure Code , 2nd ed. Redmond, WA: Microsoft Press, 2002.
[HP 2003]
Hewlett-Packard Company. Tru64 UNIX: Protecting Your System against File Name Spoofing Attacks. Houston, TX: Hewlett-Packard Company, January 2003.
...
Anchor |
---|
| IEEE Std 610.12 1990 |
---|
| IEEE Std 610.12 1990 |
---|
|
[IEEE Std 610.12 1990] IEEE.
IEEE Standard Glossary of Software Engineering Terminology .
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=159342 (1990).
Anchor |
---|
| IEEE Std 1003.1-2004 |
---|
| IEEE Std 1003.1-2004 |
---|
|
[IEEE Std 1003.1:2004] IEEE and The Open Group.
The Open Group Base Specifications Issue 6 (IEEE Std 1003.1), 2004 Edition.
(See also
ISO/IEC 9945-2004 and
Open Group 04.
) Anchor |
---|
| IEEE Std 1003.1 |
---|
| IEEE Std 1003.1 |
---|
|
Anchor |
---|
| IEEE Std 1003.1-2008 |
---|
| IEEE Std 1003.1-2008 |
---|
|
[IEEE Std 1003.1:2008] IEEE and The Open Group.
The Open Group Base Specifications Issue 7 (IEEE Std 1003.1), 2008 Edition. See also
ISO/IEC 9945-2008 and
Open Group 2008.
...
[Intel 2001] Intel Corp.
_Floating-Point IEEE Filter for Microsoft * Windows * 2000 on the Intel® Itanium© Architecture_. March 2001.
Anchor |
---|
| Internet Society 00 |
---|
| Internet Society 00 |
---|
|
[Internet Society 2000] The Internet Society.
Internet Security Glossary (RFC 2828). 2000.
...
Anchor |
---|
| ISO/IEC 9899-2011 |
---|
| ISO/IEC 9899-2011 |
---|
|
Anchor |
---|
| ISO-IEC 9899-2011 |
---|
| ISO-IEC 9899-2011 |
---|
|
[ISO/IEC 9899:2011] ISO/IEC.
Programming Languages—C, 3rd ed (ISO/IEC 9899:2011). Geneva, Switzerland: ISO, 2011.
Anchor |
---|
| ISO/IEC 9899-2017 |
---|
| ISO/IEC 9899-2017 |
---|
|
Anchor |
---|
| ISO-IEC 9899-2017 |
---|
| ISO-IEC 9899-2017 |
---|
|
[ISO/IEC 9899:2017] ISO/IEC. Programming Languages—C, 4th ed (ISO/IEC 9899:2017). Geneva, Switzerland: ISO, 2017.
Anchor |
---|
| ISO/IEC 9899-2024 |
---|
| ISO/IEC 9899-2024 |
---|
|
Anchor |
---|
| ISO-IEC 9899-2024 |
---|
| ISO-IEC 9899-2024 |
---|
|
[ISO/IEC 9899:2024] ISO/IEC. Programming Languages—C, 5th ed (ISO/IEC 9899:2024). Geneva, Switzerland: ISO, 2024.
Anchor |
---|
| ISO/IEC 9945-2003 |
---|
| ISO/IEC 9945-2003 |
---|
|
Anchor |
---|
| ISO-IEC 9945-2003 |
---|
| ISO-IEC 9945-2003 |
---|
|
[ISO/IEC 9945:2003] ISO/IEC.
Information Technology—Programming Languages, Their Environments and System Software Interfaces—Portable Operating System Interface (POSIX®) [including Technical Corrigendum 1] (ISO/IEC 9945:2003). Geneva, Switzerland: ISO, 2003.
Anchor |
---|
| ISO/IEC/IEEE 24765:2010 |
---|
| ISO/IEC/IEEE 24765:2010 |
---|
|
Anchor |
---|
| ISO/IEC/IEEE 24765-2010 |
---|
| ISO/IEC/IEEE 24765-2010 |
---|
|
[ISO/IEC/IEEE 24765:2010] ISO/IEC/IEEE.
Systems and Software Engineering—Vocabulary (ISO/IEC/IEEE 24765:2010). Geneva, Switzerland: ISO, 2010.
Anchor |
---|
| ISO/IEC/IEEE 9945-2008 |
---|
| ISO/IEC/IEEE 9945-2008 |
---|
|
Anchor |
---|
| ISO-IEC-IEEE 9945-2008 |
---|
| ISO-IEC-IEEE 9945-2008 |
---|
|
[ISO/IEC/IEEE 9945:2008]
ISO/IEC/IEEE 9945:2008 . Information Technology—Programming Languages, Their Environments and System Software Interfaces—Portable Operating System Interface (POSIX®). ® ). (ISO/IEC/IEEE 9945:2008) Geneva, Switzerland: ISO, 2008.
...
Anchor |
---|
| ISO/IEC TR 24772-2010 |
---|
| ISO/IEC TR 24772-2010 |
---|
|
Anchor |
---|
| ISO-IEC TR 24772-2010 |
---|
| ISO-IEC TR 24772-2010 |
---|
|
[ISO/IEC TR 24772:2010] ISO/IEC TR 24772:2010.
Information Technology— Programming Languages—
Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, . Geneva, Switzerland: ISO, October 2010.
Anchor |
---|
| ISO/IEC TR 24772-2013 |
---|
| ISO/IEC TR 24772-2013 |
---|
|
Anchor |
---|
| ISO-IEC TR 24772-2013 |
---|
| ISO-IEC TR 24772-2013 |
---|
|
[ISO/IEC TR 24772:2013] ISO/IEC TR 24772:2013.
Information Technology—Programming Languages—Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use.
Geneva, Switzerland: ISO, March 2013.
Anchor |
---|
| ISO/IEC TS 17961 |
---|
| ISO/IEC TS 17961 |
---|
|
Anchor |
---|
| ISO-IEC TS 17961 |
---|
| ISO-IEC TS 17961 |
---|
|
Anchor |
---|
| ISO/IEC TS 17961-2013 |
---|
| ISO/IEC TS 17961-2013 |
---|
|
[ISO/IEC TS 17961]
ISO/IEC TS 17961. Information Technology—Programming Languages, Their Environments and System Software Interfaces—C Secure Coding Rules. Geneva, Switzerland: ISO, 2012. Anchor |
---|
| ISO/IEC WG14 N1173 |
---|
| ISO/IEC WG14 N1173 |
---|
|
Anchor |
---|
| ISO-IEC WG14 N1173 |
---|
| ISO-IEC WG14 N1173 |
---|
|
[ISO/IEC WG14 N1173] ISO/IEC. Rationale for TR 24731 Extensions to the C Library—Part I: Bounds-Checking Interfaces . http://www.open-std.org/JTC1/SC22/WG14/www/docs/n1173.pdf.
[Jack 2007] Jack, Barnaby.
Vector Rewrite Attack . May 2007.
...
[Jones 2010] Jones, Larry. (2010).
WG14 N1539 Committee Draft ISO/IEC 9899:201x.http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1539.pdf.[Juric n.d.] Juric, Zeljko, et al. (n.d.).
TIGCC Documentation, Latest Development Version (TIGCC/TIGCCLIB CVS): C Language Keywords. http://tigcc.ticalc.org/doc/keywords.html(TIGCC/TIGCCLIB CVS): C Language Keywords.
[Keaton 2009] Keaton, David
, ; Plum, Thomas
, ; Seacord, Robert C.
, ; Svoboda, David
, ; Volkovitsky, Alex
, ; & Wilson, Timothy.
As-if Infinitely Ranged Integer Model. CMU/SEI-2009-TN-023. July 2009.
...
[Kernighan 1988] Kernighan, Brian W.
, & Ritchie, Dennis M.
The C Programming Language, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
...
[Klarer 2004] Klarer, R.
, ; Maddock, J.
, ; Dawes, B.
; & Hinnant, H. "
Proposal to Add Static Assertions to the Core Language (Revision 3)." ISO C++ committee paper ISO/IEC JTC1/SC22/WG21/N1720, October 2004.
http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2004/n1720.html.[Klein 2002] Klein, Jack.
Bullet Proof Integer Input Using strtol() . 2002.
...
[Lai 2006] Lai, Ray. "
Reading between Between the Lines."
OpenBSD Journal, October 2006.
[Lea 2000]
Doug Lea,
Doug. Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston, 2000.
...
[Lipson 2006] Lipson, Howard.
Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks (CMU/SEI-2006-TN-027). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2006.
Anchor |
---|
| Lipson Liu 2009Lipson |
---|
| Liu 2009 |
---|
|
[Liu 2009] Likai Liu.
Making NULL-pointer reference legal, Life of a Computer Science Student. January, 2009.
Anchor |
---|
| Lockheed Martin 05 |
---|
| Lockheed Martin 05 |
---|
|
[Lockheed Martin 2005] Lockheed Martin.
Joint Strike Fighter Air Vehicle C++ Coding Standards for the System Development and Demonstration Program. Document Number 2RDU00001 Rev C., December 2005.
[Loosemore 2007] Loosemore, Sandra
, ; Stallman, Richard M.
, ; McGrath, Roland
, ; Oram, Andrew
, ; & Drepper, Ulrich.
The GNU C Library Reference Manual, Edition 0.11. September 2007.
[McCluskey 2001]
Fexible McCluskey, Glen. Flexible Array Members and Designators in C9X .
;login:, 26, 4 (July 2001): 29–32.
[Mell 2007]
P. Mell,
Peter; Scarfone,
K., & Romanosky, SKaren; & Romanesky, Sasha. "A Complete Guide to the Common Vulnerability Scoring System Version 2.0."
FIRST, June 2007.
[Mercy 2006]
mercyMercy.
Exploiting Uninitialized Data . January 2006.
[Meyers 2004]
Meyers, Randy
Meyers.
Limited size_t WG14 N1080. September 2004.
...
[Microsoft 2007]
Microsoft. C Language Reference, 2007.
...
[Miller 1999] Miller, Todd C.
, & de Raadt, Theo. strlcpy and strlcat—Consistent, Safe, String Copy and Concatenation. In
Proceedings of the FREENIX Track, 1999 USENIX Annual Technical Conference, June 6–11, 1999, Monterey, California, USA.
Berkeley, CA: USENIX Association, 1999.
[Miller 2004] Miller, Mark C.
, ; Reus, James F.
, ; Matzke, Robb P.
, ; Koziol, Quincey A.
, ; & Cheng, Albert P. "
Smart Libraries: Best SQE Practices for Libraries with an Emphasis on Scientific Computing." In
Proceedings of the Nuclear Explosives Code Developer's Conference. Livermore, CA: Lawrence Livermore National Laboratory, December 2004.
...
[MISRA C:2012] MISRA
(Motor Industry Software Reliability Association).
MISRA C3: Guidelines for the Use of the C Language in Critical Systems 2012. Nuneaton, UK: MIRA, 2012. ISBN
978-1-906400-10-1.
[MIT 2004] MIT (Massachusetts Institute of Technology). "
MIT krb5 Security Advisory 2004-002," 2004.
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt.[MIT 2005] MIT. "
MIT krb5 Security Advisory 2005-003.http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-recvauth.txt.[MITRE] MITRE.
Common Weakness Enumeration, Version 1.8. February 2010.
...
Anchor |
---|
| IEEE Std 1003.1-2004 |
---|
| IEEE Std 1003.1-2004 |
---|
|
Anchor |
---|
| ISO/IEC 9945:2003 |
---|
| ISO/IEC 9945:2003 |
---|
|
Anchor |
---|
| ISO-IEC 9945-2003 |
---|
| ISO-IEC 9945-2003 |
---|
|
Anchor |
---|
| Open Group 04 |
---|
| Open Group 04 |
---|
|
[Open Group 2004] The Open Group.
The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition . 2004.
(See also
IEEE Std 1003.1-2004.
) Anchor |
---|
| IEEE Std 1003.1-2008 |
---|
| IEEE Std 1003.1-2008 |
---|
|
Anchor |
---|
| ISO/IEC 9945:2008 |
---|
| ISO/IEC 9945:2008 |
---|
|
Anchor |
---|
| ISO-IEC 9945-2003 |
---|
| ISO-IEC 9945-2003 |
---|
|
Anchor |
---|
| Open Group 08 |
---|
| Open Group 08 |
---|
|
[Open Group 2008] The Open Group.
The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition . 2008.
(See also
IEEE Std 1003.1-2008.
)[OpenMP]
The OpenMP API® Specification for Parallel Programming.
...
[Pethia 2003] Pethia, Richard D. "
Viruses and Worms: What Can We Do About Them?" September 10, 2003.
[Pfaff 2004] Pfaff, Ken Thompson. "
Casting (time_t)(-1)."
Google Groups comps.lang.c, March 2, 2004.
[Pike 1993] Pike, Rob & Thompson, Ken. "
Hello World."
Proceedings of the USENIX Winter 1993 Technical Conference, San Diego, CA, January 25–29, 1993, pp3 43–50.
...
[Plum 1989] Plum, Thomas
, & Saks, Dan.
C Programming Guidelines, 2nd ed. Kamuela, HI: Plum Hall, 1989 (ISBN 0911537074).
...
[Plum 2008] Plum, Thomas. "
Static Assertions.
" June 2008. http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1330.pdf" June 2008.[Plum 2012] Plum, Thomas.
C Finally Gets a New Standard.
Dr. Dobb's, 2012.
[Redwine 2006] Redwine, Samuel T., Jr., ed.
Secure Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.1. U.S. Department of Homeland Security, September 2006.
(See
Software Assurance Common Body of Knowledge on
Build Security In.
)[Roelker 2004] Roelker, Daniel. "
HTTP IDS Evasions Revisited." September 2004.
...
[Saks 2000] Saks, Dan. "
Numeric Literals ." Embedded Systems Programming, September 2000.[Saks 2001a] Saks, Dan. "
Symbolic Constants ." Embedded Systems Design, November 2001.[Saks 2001b] Saks, Dan. "
Enumeration Constants vs. Constant Objects."
Embedded Systems Design, November 2001.
...
[Saks 2008] Saks, Dan
, & Dewhurst, Stephen C. "Sooner Rather Than Later: Static Programming Techniques for C++" (presentation). March 2008.
[Saltzer 1974] Saltzer, J. H. "
Protection and the Control of Information Sharing in Multics."
Communications of the ACM 17, 7 (July 1974): 388–402.
[Saltzer 1975] Saltzer, J. H.
, & Schroeder, M. D. "
The Protection of Information in Computer Systems."
Proceedings of the IEEE 63, 9 (September 1975): 1278–1308.
[Schwarz 2005] Schwarz, B.
, ; Wagner, Hao Chen
, ; Morrison, D.
, ; West, G.
, ; Lin, J.
, ; & Tu, J. Wei. "
Model Checking an Entire Linux Distribution for Security Violations."
Proceedings of the 21st Annual Computer Security Applications Conference, December 2005 (ISSN 1063-9527; ISBN 0-7695-2461-3).
[Seacord 2003] Seacord, Robert C.
, ; Plakosh, Daniel
, ; & Lewis, Grace A.
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices . Boston: Addison-Wesley, 2003.
Anchor |
---|
| Seacord 2005a |
---|
| Seacord 2005a |
---|
|
[Seacord 2005a] Seacord, Robert C.
Secure Coding in C and C++. Boston: Addison-Wesley, 2005.
(See
http://www.cert.org/books/secure-coding for news and errata.
)[Seacord 2005b] Seacord, Robert C. "Managed String Library for C, C/C++."
Users Journal,
23, 10 (October 2005): 30–34.
...
Anchor |
---|
| Seacord 2013a |
---|
| Seacord 2013a |
---|
|
[Seacord 2013a] Seacord, Robert C.
“C “C Secure Coding Rules: Past, Present, and Future.”
InformIT, June 26, 2013.
http://www.informit.com/articles/article.aspx?p=2088511.[Seacord 2013b] Seacord, Robert C.
Secure Coding in C and C++. Boston: Addison-Wesley, 2013.
(See
http://www.cert.org/books/secure-coding for news and errata.
)[Secunia] Secunia Advisory SA10635, "
HP-UX calloc Buffer Size Miscalculation Vulnerability." 2004.
...
[Sloss 2004] Sloss, Andrew
, ; Symes, Dominic
, ; & Wright, Chris.
ARM System Developer's Guide . San Francisco: Elsevier/Morgan Kauffman, 2004 (ISBN-10: 1558608745; ISBN-13: 978-1558608740).
...
Anchor |
---|
| StackOvflw 09 |
---|
| StackOvflw 09 |
---|
|
[StackOvflw 2009]
StackOverflow.com. "Should I return TRUE / FALSE values from a C function?" StackOverflow.com User Questions, March 15, 2010.
...
[Summit 2005] Summit, Steve.
comp.lang.c Frequently Asked Questions . 2005.
[Sun 1993]
Sun Microsystems. Sun Security Bulletin #00122. 1993.
[Sun 2005]
Sun Microsystems. C User's Guide. 819-3688-10. Sun Microsystems, 2005.
[Sutter 2004] Sutter, Herb
, & Alexandrescu, Andrei.
C++ Coding Standards: 101 Rules, Guidelines, and Best Practices. Boston: Addison-Wesley Professional, 2004 (ISBN 0321113586).
[Tsafrir 2008] Tsafrir, Dan
, ; Da Silva, Dilma
, ; & Wagner, David.
The Murky Issue of Changing Process Identity: Revising "Setuid Demystified." USENIX, June 2008, pp. 55–66
...
Anchor |
---|
| van Sprundel06 |
---|
| van Sprundel06 |
---|
|
[van Sprundel 2006] van Sprundel, Ilja.
Unusualbugs. 2006.
[Viega 2001] Viega, John.
Protecting Sensitive Data in Memory. February 2001.
[Viega 2003] Viega, John
, & Messier, Matt.
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).
...
[VU#654390] Rafail, Jason A. Vulnerability Note
VU#654390,
ISC DHCP Contains C Includes That Define vsnprintf() to vsprintf() Creating Potential Buffer Overflow Conditions. June 2004.
...
[VU#743092] Rafail, Jason A. & Havrilla, Jeffrey S. Vulnerability Note
VU#743092,
realpath(3) Function Contains Off-by-One Buffer Overflow. July 2003.
...
[VU#925211] Dougherty, Chad. Vulnerability Note
VU#925211, “Debian and Ubuntu OpenSSL Packages Contain a Predictable Random Number Generator.” June 2008.
https://www.kb.cert.org/vuls/id/925211. Anchor |
---|
| Walfridsson 03 |
---|
| Walfridsson 03 |
---|
|
...
[WG14/N1396] Thomas, J.
, Tydeman& Tydeman, F. "
Wide function return values." September 2009.
...