Title: AA. Bibliography  
Author: Robert C. Seacord Jun 19, 2006
Last Changed by: David Svoboda Nov 06, 2024
Tiny Link: (useful for email) https://wiki.sei.cmu.edu/confluence/x/KtYxBQ
Export As: Word · PDF  
Incoming Links
SEI CERT C Coding Standard (275)
    Page: EXP47-C. Do not call va_arg with an argument of the incorrect type
    Page: PRE02-C. Macro replacement lists should be parenthesized
    Page: STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
    Page: DCL41-C. Do not declare variables inside a switch statement before the first case label
    Page: MEM31-C. Free dynamically allocated memory when no longer needed
    Page: DCL06-C. Use meaningful symbolic constants to represent literal values
    Page: ENV33-C. Do not call system()
    Page: INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
    Page: ENV30-C. Do not modify the object referenced by the return value of certain functions
    Page: POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument
    Page: POS02-C. Follow the principle of least privilege
    Page: API05-C. Use conformant array parameters
    Page: MSC01-C. Strive for logical completeness
    Page: ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it
    Page: FLP36-C. Preserve precision when converting integral values to floating-point type
    Page: CON03-C. Ensure visibility when accessing shared variables
    Page: EXP19-C. Use braces for the body of an if, for, or while statement
    Page: EXP03-C. Do not assume the size of a structure is the sum of the sizes of its members
    Page: CON34-C. Declare objects shared between threads with appropriate storage durations
    Page: MSC10-C. Character encoding: UTF8-related issues
    Page: DD. Unspecified Behavior
    Page: MEM06-C. Ensure that sensitive data is not written out to disk
    Page: MSC12-C. Detect and remove code that has no effect or is never executed
    Page: PRE04-C. Do not reuse a standard header file name
    Page: ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array
    Page: POS30-C. Use the readlink() function properly
    Page: STR09-C. Don't assume numeric values for expressions with type plain character
    Page: EXP42-C. Do not compare padding data
    Page: MSC14-C. Do not introduce unnecessary platform dependencies
    Page: POS54-C. Detect and handle POSIX library errors
    Page: EXP05-C. Do not cast away a const qualification
    Page: ARR39-C. Do not add or subtract a scaled integer to a pointer
    Page: PRE09-C. Do not replace secure functions with deprecated or obsolescent functions
    Page: MSC20-C. Do not use a switch statement to transfer control into a complex block
    Page: ENV02-C. Beware of multiple environment variables with the same effective name
    Page: EXP30-C. Do not depend on the order of evaluation for side effects
    Page: ERR30-C. Take care when reading errno
    Page: FIO17-C. Do not rely on an ending null character when using fread()
    Page: MSC15-C. Do not depend on undefined behavior
    Page: CON33-C. Avoid race conditions when using library functions
    Page: MSC13-C. Detect and remove unused values
    Page: FIO11-C. Take care when specifying the mode parameter of fopen()
    Page: MSC30-C. Do not use the rand() function for generating pseudorandom numbers
    Page: POS48-C. Do not unlock or destroy another POSIX thread's mutex
    Page: POS51-C. Avoid deadlock with POSIX threads by locking in predefined order
    Page: FIO19-C. Do not use fseek() and ftell() to compute the size of a regular file
    Page: FIO02-C. Canonicalize path names originating from tainted sources
    Page: FIO06-C. Create files with appropriate access permissions
    Page: MEM34-C. Only free memory allocated dynamically
    Page: MSC40-C. Do not violate constraints
    Page: INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs
    Page: API04-C. Provide a consistent and usable error-checking mechanism
    Page: FIO13-C. Never push back anything other than one read character
    Page: STR37-C. Arguments to character-handling functions must be representable as an unsigned char
    Page: CON41-C. Wrap functions that can fail spuriously in a loop
    Page: DCL21-C. Understand the storage of compound literals
    Page: BB. Definitions
    Page: INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand
    Page: CON07-C. Ensure that compound operations on shared variables are atomic
    Page: PRE05-C. Understand macro replacement when concatenating tokens or performing stringification
    Page: FIO03-C. Do not make assumptions about fopen() and file creation
    Page: MSC24-C. Do not use deprecated or obsolescent functions
    Page: STR01-C. Adopt and implement a consistent plan for managing strings
    Page: STR02-C. Sanitize data passed to complex subsystems
    Page: DCL38-C. Use the correct syntax when declaring a flexible array member
    Page: EXP37-C. Call functions with the correct number and type of arguments
    Page: INT30-C. Ensure that unsigned integer operations do not wrap
    Page: ERR32-C. Do not rely on indeterminate values of errno
    Page: EXP16-C. Do not compare function pointers to constant values
    Page: FIO05-C. Identify files using multiple file attributes
    Page: DCL02-C. Use visually distinct identifiers
    Page: DCL09-C. Declare functions that return errno with a return type of errno_t
    Page: DCL13-C. Declare function parameters that are pointers to values not changed by the function as const
    Page: FIO22-C. Close files before spawning processes
    Page: WIN02-C. Restrict privileges when spawning child processes
    Page: ERR34-C. Detect errors when converting a string to a number
    Page: FIO15-C. Ensure that file operations are performed in a secure directory
    Page: MEM36-C. Do not modify the alignment of objects by calling realloc()
    Page: DCL16-C. Use "L," not "l," to indicate a long value
    Page: PRE10-C. Wrap multistatement macros in a do-while loop
    Page: FIO42-C. Close files when they are no longer needed
    Page: MEM10-C. Define and use a pointer validation function
    Page: FIO18-C. Never expect fwrite() to terminate the writing process at a null character
    Page: ARR36-C. Do not subtract or compare two pointers that do not refer to the same array
    Page: EXP33-C. Do not read uninitialized memory
    Page: MEM01-C. Store a new value in pointers immediately after free()
    Page: DCL30-C. Declare objects with appropriate storage durations
    Page: MEM33-C. Allocate and copy structures containing a flexible array member dynamically
    Page: ISO/IEC TS 17961 C Secure Coding Rules
    Page: FIO01-C. Be careful using functions that use file names for identification
    Page: INT17-C. Define integer constants in an implementation-independent manner
    Page: STR11-C. Do not specify the bound of a character array initialized with a string literal
    Page: EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
    Page: MSC00-C. Compile cleanly at high warning levels
    Page: MSC41-C. Never hard code sensitive information
    Page: FLP02-C. Avoid using floating-point numbers when precise computation is needed
    Page: FLP37-C. Do not use object representations to compare floating-point values
    Page: DCL39-C. Avoid information leakage when passing a structure across a trust boundary
    Page: MSC06-C. Beware of compiler optimizations
    Page: FLP03-C. Detect and handle floating-point errors
    Page: STR10-C. Do not concatenate different type of string literals
    Page: FIO32-C. Do not perform operations on devices that are only appropriate for files
    Page: POS47-C. Do not use threads that can be canceled asynchronously
    Page: FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful
    Page: STR38-C. Do not confuse narrow and wide character strings and functions
    Page: MSC09-C. Character encoding: Use subset of ASCII for safety
    Page: ENV34-C. Do not store pointers returned by certain functions
    Page: FIO30-C. Exclude user input from format strings
    Page: ARR30-C. Do not form or use out-of-bounds pointers or array subscripts
    Page: DCL01-C. Do not reuse variable names in subscopes
    Page: EXP34-C. Do not dereference null pointers
    Page: CON40-C. Do not refer to an atomic variable twice in an expression
    Page: EXP36-C. Do not cast pointers into more strictly aligned pointer types
    Page: SIG00-C. Mask signals handled by noninterruptible signal handlers
    Page: EXP32-C. Do not access a volatile object through a nonvolatile reference
    Page: SIG31-C. Do not access shared objects in signal handlers
    Page: DCL40-C. Do not create incompatible declarations of the same function or object
    Page: MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type
    Page: ERR02-C. Avoid in-band error indicators
    Page: EXP11-C. Do not make assumptions regarding the layout of structures with bit-fields
    Page: INT08-C. Verify that all integer values are in range
    Page: STR30-C. Do not attempt to modify string literals
    Page: Errata for SEI CERT C Coding Standard (2016 Edition)
    Page: MSC32-C. Properly seed pseudorandom number generators
    Page: EXP13-C. Treat relational and equality operators as if they were nonassociative
    Page: FLP06-C. Convert integers to floating point for floating-point operations
    Page: DCL18-C. Do not begin integer constants with 0 when specifying a decimal value
    Page: INT36-C. Converting a pointer to integer or integer to pointer
    Page: INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types
    Page: FLP05-C. Do not use denormalized numbers
    Page: FIO34-C. Distinguish between characters read from a file and EOF or WEOF
    Page: MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value
    Page: MSC22-C. Use the setjmp(), longjmp() facility securely
    Page: MSC05-C. Do not manipulate time_t typed values directly
    Page: CON38-C. Preserve thread safety and liveness when using condition variables
    Page: DCL31-C. Declare identifiers before using them
    Page: MEM05-C. Avoid large stack allocations
    Page: EXP40-C. Do not modify constant objects
    Page: EXP12-C. Do not ignore values returned by functions
    Page: FLP32-C. Prevent or detect domain and range errors in math functions
    Page: FLP34-C. Ensure that floating-point conversions are within range of the new type
    Page: PRE00-C. Prefer inline or static functions to function-like macros
    Page: STR00-C. Represent characters using an appropriate type
    Page: POS36-C. Observe correct revocation order while relinquishing privileges
    Page: ERR04-C. Choose an appropriate termination strategy
    Page: FIO10-C. Take care when using the rename() function
    Page: CON02-C. Do not use volatile as a synchronization primitive
    Page: How this Coding Standard is Organized
    Page: FIO08-C. Take care when calling remove() on an open file
    Page: INT07-C. Use only explicitly signed or unsigned char type for numeric values
    Page: ERR33-C. Detect and handle standard library errors
    Page: STR07-C. Use the bounds-checking interfaces for string manipulation
    Page: MSC04-C. Use comments consistently and in a readable fashion
    Page: MSC37-C. Ensure that control never reaches the end of a non-void function
    Page: DCL10-C. Maintain the contract between the writer and caller of variadic functions
    Page: API00-C. Functions should validate their parameters
    Page: EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int
    Page: ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer
    Page: MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources
    Page: STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string
    Page: ENV03-C. Sanitize the environment when invoking external programs
    Page: EXP00-C. Use parentheses for precedence of operation
    Page: CON39-C. Do not join or detach a thread that was previously joined or detached
    Page: INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
    Page: STR08-C. Use managed strings for development of new string manipulation code
    Page: PRE30-C. Do not create a universal character name through concatenation
    Page: INT35-C. Use correct integer precisions
    Page: DCL00-C. Const-qualify immutable objects
    Page: API03-C. Create consistent interfaces and capabilities across related functions
    Page: FIO38-C. Do not copy a FILE object
    Page: EXP07-C. Do not diminish the benefits of constants by assuming their values in expressions
    Page: CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction
    Page: PRE07-C. Avoid using repeated question marks
    Page: INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
    Page: DCL17-C. Beware of miscompiled volatile-qualified variables
    Page: Conformance Testing
    Page: POS44-C. Do not use signals to terminate threads
    Page: PRE01-C. Use parentheses within macros around parameter names
    Page: DCL08-C. Properly encode relationships in constant definitions
    Page: FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call
    Page: FLP04-C. Check floating-point inputs for exceptional values
    Page: EXP35-C. Do not modify objects with temporary lifetime
    Page: FIO24-C. Do not open a file that is already open
    Page: POS37-C. Ensure that privilege relinquishment is successful
    Page: DCL15-C. Declare file-scope objects or functions that do not need external linkage as static
    Page: STR34-C. Cast characters to unsigned char before converting to larger integer sizes
    Page: ERR01-C. Use ferror() rather than errno to check for FILE stream errors
    Page: MEM30-C. Do not access freed memory
    Page: CON37-C. Do not call signal() in a multithreaded program
    Page: CON43-C. Do not allow data races in multithreaded code
    Page: INT14-C. Avoid performing bitwise and arithmetic operations on the same data
    Page: INT00-C. Understand the data model used by your implementation(s)
    Page: INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression
    Page: FLP00-C. Understand the limitations of floating-point numbers
    Page: CON31-C. Do not destroy a mutex while it is locked
    Page: Government Regulations
    Page: POS01-C. Check for the existence of links when dealing with files
    Page: ENV01-C. Do not make assumptions about the size of an environment variable
    Page: MEM03-C. Clear sensitive information stored in reusable resources
    Page: STR04-C. Use plain char for characters in the basic character set
    Page: DCL36-C. Do not declare an identifier with conflicting linkage classifications
    Page: INT01-C. Use rsize_t or size_t for all integer values representing the size of an object
    Page: PRE03-C. Prefer typedefs to defines for encoding non-pointer types
    Page: MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro
    Page: POS53-C. Do not use more than one mutex for concurrent waiting operations on a condition variable
    Page: Scope
    Page: DCL11-C. Understand the type issues associated with variadic functions
    Page: PRE08-C. Guarantee that header file names are unique
    Page: CC. Undefined Behavior
    Page: ERR06-C. Understand the termination behavior of assert() and abort()
    Page: FIO21-C. Do not create temporary files in shared directories
    Page: EXP08-C. Ensure pointer arithmetic is used correctly
    Page: MSC18-C. Be careful while handling sensitive data, such as passwords, in program code
    Page: EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement
    Page: FIO20-C. Avoid unintentional truncation when using fgets() or fgetws()
    Page: INT32-C. Ensure that operations on signed integers do not result in overflow
    Page: FLP07-C. Cast the return value of a function that returns a floating-point type
    Page: CON09-C. Avoid the ABA problem when using lock-free algorithms
    Page: MEM35-C. Allocate sufficient memory for an object
    Page: SIG30-C. Call only asynchronous-safe functions within signal handlers
    Page: DCL22-C. Use volatile for data that cannot be cached
    Page: FIO44-C. Only use values for fsetpos() that are returned from fgetpos()
    Page: MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap
    Page: EXP20-C. Perform explicit tests to determine success, true and false, and equality
    Page: ARR38-C. Guarantee that library functions do not form invalid pointers
    Page: INT10-C. Do not assume a positive remainder when using the % operator
    Page: EXP46-C. Do not use a bitwise operator with a Boolean-like operand
    Page: DCL12-C. Implement abstract data types using opaque types
    Page: INT04-C. Enforce limits on integer values originating from tainted sources
    Page: CON04-C. Join or detach threads even if their exit status is unimportant
    Page: POS52-C. Do not perform operations that can block while holding a POSIX lock
    Page: CON08-C. Do not assume that a group of calls to independently atomic methods is atomic
    Page: FIO45-C. Avoid TOCTOU race conditions while accessing files
    Page: POS05-C. Limit access to files by creating a jail
    Page: STR03-C. Do not inadvertently truncate a string
    Page: PRE06-C. Enclose header files in an include guard
    Page: ERR07-C. Prefer functions that support error checking over equivalent functions that don't
    Page: STR06-C. Do not assume that strtok() leaves the parse string unchanged
    Page: FIO47-C. Use valid format strings
    Page: FIO46-C. Do not access a closed file
    Page: FLP01-C. Take care in rearranging floating-point expressions
    Page: INT09-C. Ensure enumeration constants map to unique values
    Page: ARR32-C. Ensure size arguments for variable length arrays are in a valid range
    Page: DCL23-C. Guarantee that mutually visible identifiers are unique
    Page: STR05-C. Use pointers to const when referring to string literals
    Page: ARR37-C. Do not add or subtract an integer to a pointer to a non-array object
    Page: INT02-C. Understand integer conversion rules
    Page: CON36-C. Wrap functions that can spuriously wake up in a loop
    Page: DCL20-C. Explicitly specify void when a function accepts no arguments
    Page: DCL37-C. Do not declare or define a reserved identifier
    Page: SIG02-C. Avoid using signals to implement normal functionality
    Page: EXP45-C. Do not perform assignments in selection statements
    Page: MSC33-C. Do not pass invalid data to the asctime() function
    Page: ERR03-C. Use runtime-constraint handlers when calling the bounds-checking interfaces
    Page: ERR00-C. Adopt and implement a consistent and comprehensive error-handling policy
    Page: EXP39-C. Do not access a variable through a pointer of an incompatible type
    Page: FLP30-C. Do not use floating-point variables as loop counters
    Page: POS35-C. Avoid race conditions while checking for the existence of a symbolic link
    Page: PRE31-C. Avoid side effects in arguments to unsafe macros
    Page: MSC07-C. Detect and remove dead code
    Page: DCL07-C. Include the appropriate type information in function declarators
    Page: MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
    Page: DCL03-C. Use a static assertion to test the value of a constant expression
    Page: ERR05-C. Application-independent code should provide error detection without dictating error handling
    Page: MEM04-C. Beware of zero-length allocations
    Page: SIG35-C. Do not return from a computational exception signal handler
    Page: History
    Page: CON32-C. Prevent data races when accessing bit-fields from multiple threads
    Page: PRE32-C. Do not use preprocessor directives in invocations of function-like macros
    Page: EXP43-C. Avoid undefined behavior when using restrict-qualified pointers
    Page: FIO09-C. Be careful with binary data when transferring data across systems
    Page: API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size
    Page: INT13-C. Use bitwise operators only on unsigned operands
    Page: POS39-C. Use the correct byte ordering when transferring data between systems
    Page: WIN04-C. Consider encrypting function pointers
SEI CERT Oracle Coding Standard for Java (1)
    Page: Rule BB. Glossary
SEI CERT C++ Coding Standard (5)
    Page: CON55-CPP. Preserve thread safety and liveness when using condition variables
    Page: CTR55-CPP. Do not use an additive operator on an iterator if the result would overflow
    Page: CON54-CPP. Wrap functions that can spuriously wake up in a loop
    Page: How this Coding Standard Is Organized
    Page: MEM50-CPP. Do not access freed memory
Hierarchy
Parent Page
    Page: 4 Back Matter
Labels
Global Labels (2)
Time Editor  
Nov 06, 2024 10:24 David Svoboda View Changes
C17 ref as well as C24 ref
Oct 17, 2024 08:43 Caden Milne View Changes
Added bibliography entry and anchors for the 2024 edition of "Programming Languages-C" from ISO.
Sep 12, 2019 21:48 David Svoboda View Changes
fixed howard 2002 link
Sep 12, 2019 21:47 David Svoboda View Changes
fixed Howard 2002 link
Apr 04, 2019 08:52 Yozo TODA  
URL of [McCluskey 2001] revised.
Outgoing Links
External Links (195)
    amddevcentral.com/Resources/archive/documentation/articles/…
    www.cs.berkeley.edu/%7Edaw/papers/setuid-usenix02.pdf
    www.stack.nl/%7Emarcov/buildfaq.pdf
    www.ibm.com/developerworks/aix/library/au-hook_duttaC.html
    www.kb.cert.org/vulnotes/id/654390
    www.open-std.org/JTC1/SC22/WG14/www/docs/n1173.pdf
    www.doc.ic.ac.uk/lab/cplus/c++.rules/
    iase.disa.mil/stigs/Documents/U_Application_Security_and_De…
    www.kb.cert.org/vulnotes/id/568148
    www.kernel.org/doc/man-pages/online_pages.html
    www.kb.cert.org/vuls/id/925211
    www.hackersdelight.org/
    www.kb.cert.org/vuls/id/159523
    www.unicode.org/versions/Unicode6.2.0/
    www.gnu.org/software/pth/
    www.securesoftware.com/process/
    cve.mitre.org/
    cwe.mitre.org/
    www.leshatton.org/Documents/ISOC_subset.pdf
    www.hpenterprisesecurity.com/vulncat/en/vulncat/intro.html
    www.cl.cam.ac.uk/%7Emgk25/unicode.html
    www.us-cert.gov/cas/techalerts/index.html
    www.gnu.org/software/libc/manual/
    www.cert.org/secure-coding/
    www.slideshare.net/amiable_indian/unusual-bugs
    www.faqs.org/rfcs/rfc2279.html
    www.opengroup.org/onlinepubs/009695399/toc.htm
    www.owasp.org/index.php/Using_freed_memory
    www.open-std.org/jtc1/sc22/wg14/www/docs/n791.htm
    https://www.securecoding.cert.org/confluence/display/seccod…
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1248.pdf
    www.cert.org/books/secure-coding
    kqueue.org/blog/2012/06/25/more-randomness-or-less/
    ftp://ftp.rfc-editor.org/in-notes/rfc2828.txt
    www.informit.com/store/product.aspx?isbn=0201633922
    www.network-theory.co.uk/docs/gccintro/index.html
    www.unix.org/whitepapers/64bit.html
    resources.sei.cmu.edu/library/asset-view.cfm?assetid=52665
    www.embedded.com/columns/programmingpointers/9900661?_reque…
    www.cppreference.com/
    lwn.net/2000/1221/a/sec-tmp.php3
    www.cert.org/advisories/CA-2003-16.html
    www.kb.cert.org/vulnotes/id/743092
    www.felinemenace.org/papers/UBehavior.zip
    developer.apple.com/documentation/Security/Conceptual/Secur…
    web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-rec…
    www.brainbell.com/tutors/c/Advice_and_Warnings_for_C/
    msdn2.microsoft.com/en-us/library/fw5abdx6%28VS.80%29.aspx
    www.openbsd.org/cgi-bin/man.cgi
    www.fsf.org
    https://www.usenix.org/system/files/login/articles/1789-mcc…
    www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Flake.…
    www.avertlabs.com/research/blog/index.php/2008/02/13/analyz…
    seclists.org/bugtraq/1998/Aug/0071.html
    www.gotw.ca/publications/c++cs.htm
    www.drdobbs.com/go-parallel/article/showArticle.jhtml;jsess…
    www.kb.cert.org/vuls/id/834865
    www.kb.cert.org/vulnotes/id/196240
    www.informit.com/store/product.aspx?isbn=0321118847
    www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/
    www.embedded.com/columns/programmingpointers/164900888?_req…
    www.lysator.liu.se/c/duffs-device.html
    www.eecs.berkeley.edu/%7Edaw/papers/setuid-login08b.pdf
    www.keil.com/support/man/docs/armlib/armlib_bihbjiea.htm
    https://tools.ietf.org/html/rfc6520
    www.gnu.org/prep/standards/standards.html
    www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf
    www.cgisecurity.com/lib/protecting-sensitive-data.html
    refspecs.freestandards.org/LSB_3.1.0/LSB-Core-generic/LSB-C…
    gcc.gnu.org/bugs/#nonbugs_c
    www.open-std.org/jtc1/sc22/wg21/docs/papers/1993/N0389.asc
    www.informit.com/articles/article.aspx?p=2088511
    www.spinellis.gr/codequality
    h30097.www3.hp.com/docs/wpapers/spoof_wp/symlink_external.p…
    blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-…
    www.securiteam.com/windowsntfocus/5MP0D0UKKO.html
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1290.pdf
    citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.208.4289&…
    c-faq.com/
    www.kb.cert.org/vulnotes/id/649732
    www.embedded.com/electronics-blogs/programming-pointers/400…
    pbma.nasa.gov/docs/public/pbma/general/guidbook.doc
    cert.uni-stuttgart.de/advisories/calloc.php
    www.kb.cert.org/vulnotes/id/881872
    www.drdobbs.com/cpp/232800444
    www.mkssoftware.com/docs/api_index.asp/
    samate.nist.gov/docs/source_code_security_analysis_spec_SP5…
    www.kb.cert.org/vuls/id/720951
    www.kb.cert.org/vuls/id/623332
    people.redhat.com/drepper/defprogramming.pdf
    www.opengroup.org/onlinepubs/7990989775/toc.htm
    web.archive.org/web/20030919012916/http://www.cert.org/cong…
    https://www.viva64.com/en/b/0388/
    ftp://download.intel.com/software/opensource/libraries/ieee…
    www.opengroup.org/onlinepubs/9699919799
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1330.pdf
    seclists.org/bugtraq/1997/Jan/0011.html
    www.sei.cmu.edu/publications/documents/09.reports/09tn023.h…
    xorl.wordpress.com/
    https://www.securecoding.cert.org/confluence/display/seccod…
    www.cs.auckland.ac.nz/%7Epgut001/pubs/secure_del.html
    samate.nist.gov/SRD/
    citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.126.9257&…
    www.kb.cert.org/vulnotes/id/551436
    www.oracle.com/technetwork/server-storage/solaris/cc-restri…
    www.misra.org.uk/
    ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=159342
    https://computing.llnl.gov/tutorials/pthreads/#Mutexes
    www.snort.org/assets/164/sf_HTTP_IDS_evasions.pdf
    gcc.gnu.org/ml/gcc-help/2005-11/msg00141.html
    cansecwest.com/csw07/Vector-Rewrite-Attack.pdf
    www.kb.cert.org/vulnotes/id/286468
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1080.pdf
    www.ietf.org/rfc/rfc1813.txt
    www.kb.cert.org/vuls/id/439395
    cnst.livejournal.com/24040.html
    www.greenend.org.uk/rjk/2001/02/cfu.html
    plan9.bell-labs.com/sys/doc/utf.pdf
    docs.sun.com/source/806-3568/ncg_goldberg.html
    www-128.ibm.com/developerworks/linux/library/l-calls.html
    https://www.amazon.com/Writing-Secure-Second-Developer-Prac…
    en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report
    blogs.23.nu/ilja/stories/12551/
    undeadly.org/cgi?action=article&sid=20061027031811
    lifecs.likai.org/2009/01/making-null-pointer-reference-lega…
    secunia.com/advisories/10635/
    cellperformance.beyond3d.com/articles/2006/06/understanding…
    winjade.net/2009/01/lesson-on-infinite-loops/
    phrack.org/archives/issues/63/14.txt
    docs.sun.com/source/819-3688/
    www.open-std.org/JTC1/SC22/WG11/
    www.theregister.co.uk/2009/07/17/linux_kernel_exploit/
    www.securityfocus.com/advisories/198
    https://buildsecurityin.us-cert.gov/
    www.unicode.org/standard/standard.html
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1539.pdf
    https://buildsecurityin.us-cert.gov/bsi/home.html
    www.cert.org/books/secure-coding/LWM%203-11%20%28Seacord%29…
    www.embedded.com/electronics-blogs/programming-pointers/440…
    www.greenend.org.uk/rjk/2003/03/inline.html
    www.microsoft.com/technet/security/bulletin/MS03-026.mspx
    doi.acm.org/10.1145/956641.956647
    tigcc.ticalc.org/doc/keywords.html
    https://iasecontent.disa.mil/stigs/zip/U_ASD_V4R8_STIG.zip
    www.open-std.org/jtc1/sc22/wg14/www/C99RationaleV5.10.pdf
    www.openbsd.org/papers/openssh-measures-asiabsdcon2007.pdf
    www.cert.org/stats/cert_stats.html
    www.open-std.org/jtc1/sc22/wg21/docs/papers/2004/n1720.html
    msdn.microsoft.com/en-us/default.aspx
    developer.amd.com/
    https://wci.llnl.gov/codes/smartlibs/UCRL-JRNL-208636.pdf
    www.embedded.com/story/OEG20011016S0116
    www.embedded.com/columns/programmingpointers/9900402
    mail-index.netbsd.org/tech-kern/2003/08/11/0001.html
    secureapps.blogspot.com/2006/10/security-considerations-whe…
    web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree…
    www.owasp.org/index.php/Double_Free
    portal.acm.org/citation.cfm?id=1450058.1450093
    seclists.org/dailydave/2010/q2/27
    gcc.gnu.org/onlinedocs
    www.embedded.com/2000/0009/0009pp.htm
    www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20con…
    www.embedded.com/story/OEG20020124S0117
    stackoverflow.com/questions/559061/should-i-return-true-fal…
    www.opengroup.org/onlinepubs/009695399/
    www.kb.cert.org/vuls/id/837857
    openmp.org/wp/
    standards.iso.org/ittf/PubliclyAvailableStandards/index.htm…
    resources.sei.cmu.edu/asset_files/TechnicalReport/2006_005_…
    groups.google.com/group/comp.lang.c/browse_thread/thread/89…
    www.open-std.org/jtc1/sc22/wg14/www/docs/n1396.htm
    www.opengroup.org/onlinepubs/9699919799/toc.htm
    www.netrino.com/Articles/OffsetOf/index.php
    winjade.net/
    home.att.net/%7Ejackklein/c/code/strtol.html
    www.embedded.com/columns/programmingpointers/197008821
    www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detai…
    https://buildsecurityin.us-cert.gov/daisy/bsi/articles/know…
    www.knosof.co.uk/cbook/
    www.securityfocus.com/bid/10538/discuss
    grouper.ieee.org/groups/754/
    www.phy.duke.edu/%7Ergb/General/c_book/c_book/index.html
    https://www.securecoding.cert.org/confluence/display/seccod…
    www.dss.mil/documents/odaa/nispom2006-5220.pdf
    lcamtuf.coredump.cx/signals.txt
    www.kb.cert.org/vuls/id/162289
    www.arm.com/documentation/books/4975.html
    ieeexplore.ieee.org/servlet/opac?punumber=6506089
    www.stroustrup.com/JSF-AV-rules.pdf
    blog.existentialize.com/diagnosis-of-the-openssl-heartbleed…
    https://buildsecurityin.us-cert.gov/daisy/bsi/resources/dhs…
    iasecontent.disa.mil/stigs/zip/Aug2016/U_ASD_V4R1_STIG.zip
    bruce-eckel.developpez.com/livres/cpp/ticpp/v2/
    www.caravan.net/ec2plus/guide.html
    citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.169.2051&…
SEI CERT C Coding Standard (1)     Home page: SEI CERT C Coding Standard