Skip to main content
assistive.skiplink.to.breadcrumbs
assistive.skiplink.to.header.menu
assistive.skiplink.to.action.menu
assistive.skiplink.to.quick.search
Log in
Confluence
Spaces
Hit enter to search
Help
Online Help
Keyboard Shortcuts
Feed Builder
What’s new
Available Gadgets
About Confluence
Log in
SEI CERT C Coding Standard
Pages
Boards
Space shortcuts
Dashboard
Secure Coding Home
Android
C
C++
Java
Perl
Page tree
Browse pages
Configure
Space tools
View Page
A
t
tachments (0)
Page History
Page Information
View in Hierarchy
View Source
Export to PDF
Export to Word
Pages
…
SEI CERT C Coding Standard
4 Back Matter
AA. Bibliography
Page Information
Title:
AA. Bibliography
Author:
Robert C. Seacord
Jun 19, 2006
Last Changed by:
David Svoboda
Nov 06, 2024
Tiny Link:
(useful for email)
https://wiki.sei.cmu.edu/confluence/x/KtYxBQ
Export As:
Word
·
PDF
Incoming Links
SEI CERT C Coding Standard (275)
Page:
EXP47-C. Do not call va_arg with an argument of the incorrect type
Page:
PRE02-C. Macro replacement lists should be parenthesized
Page:
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
Page:
DCL41-C. Do not declare variables inside a switch statement before the first case label
Page:
MEM31-C. Free dynamically allocated memory when no longer needed
Page:
DCL06-C. Use meaningful symbolic constants to represent literal values
Page:
ENV33-C. Do not call system()
Page:
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
Page:
ENV30-C. Do not modify the object referenced by the return value of certain functions
Page:
POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument
Page:
POS02-C. Follow the principle of least privilege
Page:
API05-C. Use conformant array parameters
Page:
MSC01-C. Strive for logical completeness
Page:
ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it
Page:
FLP36-C. Preserve precision when converting integral values to floating-point type
Page:
CON03-C. Ensure visibility when accessing shared variables
Page:
EXP19-C. Use braces for the body of an if, for, or while statement
Page:
EXP03-C. Do not assume the size of a structure is the sum of the sizes of its members
Page:
CON34-C. Declare objects shared between threads with appropriate storage durations
Page:
MSC10-C. Character encoding: UTF8-related issues
Page:
DD. Unspecified Behavior
Page:
MEM06-C. Ensure that sensitive data is not written out to disk
Page:
MSC12-C. Detect and remove code that has no effect or is never executed
Page:
PRE04-C. Do not reuse a standard header file name
Page:
ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array
Page:
POS30-C. Use the readlink() function properly
Page:
STR09-C. Don't assume numeric values for expressions with type plain character
Page:
EXP42-C. Do not compare padding data
Page:
MSC14-C. Do not introduce unnecessary platform dependencies
Page:
POS54-C. Detect and handle POSIX library errors
Page:
EXP05-C. Do not cast away a const qualification
Page:
ARR39-C. Do not add or subtract a scaled integer to a pointer
Page:
PRE09-C. Do not replace secure functions with deprecated or obsolescent functions
Page:
MSC20-C. Do not use a switch statement to transfer control into a complex block
Page:
ENV02-C. Beware of multiple environment variables with the same effective name
Page:
EXP30-C. Do not depend on the order of evaluation for side effects
Page:
ERR30-C. Take care when reading errno
Page:
FIO17-C. Do not rely on an ending null character when using fread()
Page:
MSC15-C. Do not depend on undefined behavior
Page:
CON33-C. Avoid race conditions when using library functions
Page:
MSC13-C. Detect and remove unused values
Page:
FIO11-C. Take care when specifying the mode parameter of fopen()
Page:
MSC30-C. Do not use the rand() function for generating pseudorandom numbers
Page:
POS48-C. Do not unlock or destroy another POSIX thread's mutex
Page:
POS51-C. Avoid deadlock with POSIX threads by locking in predefined order
Page:
FIO19-C. Do not use fseek() and ftell() to compute the size of a regular file
Page:
FIO02-C. Canonicalize path names originating from tainted sources
Page:
FIO06-C. Create files with appropriate access permissions
Page:
MEM34-C. Only free memory allocated dynamically
Page:
MSC40-C. Do not violate constraints
Page:
INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs
Page:
API04-C. Provide a consistent and usable error-checking mechanism
Page:
FIO13-C. Never push back anything other than one read character
Page:
STR37-C. Arguments to character-handling functions must be representable as an unsigned char
Page:
CON41-C. Wrap functions that can fail spuriously in a loop
Page:
DCL21-C. Understand the storage of compound literals
Page:
BB. Definitions
Page:
INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand
Page:
CON07-C. Ensure that compound operations on shared variables are atomic
Page:
PRE05-C. Understand macro replacement when concatenating tokens or performing stringification
Page:
FIO03-C. Do not make assumptions about fopen() and file creation
Page:
MSC24-C. Do not use deprecated or obsolescent functions
Page:
STR01-C. Adopt and implement a consistent plan for managing strings
Page:
STR02-C. Sanitize data passed to complex subsystems
Page:
DCL38-C. Use the correct syntax when declaring a flexible array member
Page:
EXP37-C. Call functions with the correct number and type of arguments
Page:
INT30-C. Ensure that unsigned integer operations do not wrap
Page:
ERR32-C. Do not rely on indeterminate values of errno
Page:
EXP16-C. Do not compare function pointers to constant values
Page:
FIO05-C. Identify files using multiple file attributes
Page:
DCL02-C. Use visually distinct identifiers
Page:
DCL09-C. Declare functions that return errno with a return type of errno_t
Page:
DCL13-C. Declare function parameters that are pointers to values not changed by the function as const
Page:
FIO22-C. Close files before spawning processes
Page:
WIN02-C. Restrict privileges when spawning child processes
Page:
ERR34-C. Detect errors when converting a string to a number
Page:
FIO15-C. Ensure that file operations are performed in a secure directory
Page:
MEM36-C. Do not modify the alignment of objects by calling realloc()
Page:
DCL16-C. Use "L," not "l," to indicate a long value
Page:
PRE10-C. Wrap multistatement macros in a do-while loop
Page:
FIO42-C. Close files when they are no longer needed
Page:
MEM10-C. Define and use a pointer validation function
Page:
FIO18-C. Never expect fwrite() to terminate the writing process at a null character
Page:
ARR36-C. Do not subtract or compare two pointers that do not refer to the same array
Page:
EXP33-C. Do not read uninitialized memory
Page:
MEM01-C. Store a new value in pointers immediately after free()
Page:
DCL30-C. Declare objects with appropriate storage durations
Page:
MEM33-C. Allocate and copy structures containing a flexible array member dynamically
Page:
ISO/IEC TS 17961 C Secure Coding Rules
Page:
FIO01-C. Be careful using functions that use file names for identification
Page:
INT17-C. Define integer constants in an implementation-independent manner
Page:
STR11-C. Do not specify the bound of a character array initialized with a string literal
Page:
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
Page:
MSC00-C. Compile cleanly at high warning levels
Page:
MSC41-C. Never hard code sensitive information
Page:
FLP02-C. Avoid using floating-point numbers when precise computation is needed
Page:
FLP37-C. Do not use object representations to compare floating-point values
Page:
DCL39-C. Avoid information leakage when passing a structure across a trust boundary
Page:
MSC06-C. Beware of compiler optimizations
Page:
FLP03-C. Detect and handle floating-point errors
Page:
STR10-C. Do not concatenate different type of string literals
Page:
FIO32-C. Do not perform operations on devices that are only appropriate for files
Page:
POS47-C. Do not use threads that can be canceled asynchronously
Page:
FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful
Page:
STR38-C. Do not confuse narrow and wide character strings and functions
Page:
MSC09-C. Character encoding: Use subset of ASCII for safety
Page:
ENV34-C. Do not store pointers returned by certain functions
Page:
FIO30-C. Exclude user input from format strings
Page:
ARR30-C. Do not form or use out-of-bounds pointers or array subscripts
Page:
DCL01-C. Do not reuse variable names in subscopes
Page:
EXP34-C. Do not dereference null pointers
Page:
CON40-C. Do not refer to an atomic variable twice in an expression
Page:
EXP36-C. Do not cast pointers into more strictly aligned pointer types
Page:
SIG00-C. Mask signals handled by noninterruptible signal handlers
Page:
EXP32-C. Do not access a volatile object through a nonvolatile reference
Page:
SIG31-C. Do not access shared objects in signal handlers
Page:
DCL40-C. Do not create incompatible declarations of the same function or object
Page:
MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type
Page:
ERR02-C. Avoid in-band error indicators
Page:
EXP11-C. Do not make assumptions regarding the layout of structures with bit-fields
Page:
INT08-C. Verify that all integer values are in range
Page:
STR30-C. Do not attempt to modify string literals
Page:
Errata for SEI CERT C Coding Standard (2016 Edition)
Page:
MSC32-C. Properly seed pseudorandom number generators
Page:
EXP13-C. Treat relational and equality operators as if they were nonassociative
Page:
FLP06-C. Convert integers to floating point for floating-point operations
Page:
DCL18-C. Do not begin integer constants with 0 when specifying a decimal value
Page:
INT36-C. Converting a pointer to integer or integer to pointer
Page:
INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types
Page:
FLP05-C. Do not use denormalized numbers
Page:
FIO34-C. Distinguish between characters read from a file and EOF or WEOF
Page:
MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value
Page:
MSC22-C. Use the setjmp(), longjmp() facility securely
Page:
MSC05-C. Do not manipulate time_t typed values directly
Page:
CON38-C. Preserve thread safety and liveness when using condition variables
Page:
DCL31-C. Declare identifiers before using them
Page:
MEM05-C. Avoid large stack allocations
Page:
EXP40-C. Do not modify constant objects
Page:
EXP12-C. Do not ignore values returned by functions
Page:
FLP32-C. Prevent or detect domain and range errors in math functions
Page:
FLP34-C. Ensure that floating-point conversions are within range of the new type
Page:
PRE00-C. Prefer inline or static functions to function-like macros
Page:
STR00-C. Represent characters using an appropriate type
Page:
POS36-C. Observe correct revocation order while relinquishing privileges
Page:
ERR04-C. Choose an appropriate termination strategy
Page:
FIO10-C. Take care when using the rename() function
Page:
CON02-C. Do not use volatile as a synchronization primitive
Page:
How this Coding Standard is Organized
Page:
FIO08-C. Take care when calling remove() on an open file
Page:
INT07-C. Use only explicitly signed or unsigned char type for numeric values
Page:
ERR33-C. Detect and handle standard library errors
Page:
STR07-C. Use the bounds-checking interfaces for string manipulation
Page:
MSC04-C. Use comments consistently and in a readable fashion
Page:
MSC37-C. Ensure that control never reaches the end of a non-void function
Page:
DCL10-C. Maintain the contract between the writer and caller of variadic functions
Page:
API00-C. Functions should validate their parameters
Page:
EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int
Page:
ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer
Page:
MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources
Page:
STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string
Page:
ENV03-C. Sanitize the environment when invoking external programs
Page:
EXP00-C. Use parentheses for precedence of operation
Page:
CON39-C. Do not join or detach a thread that was previously joined or detached
Page:
INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
Page:
STR08-C. Use managed strings for development of new string manipulation code
Page:
PRE30-C. Do not create a universal character name through concatenation
Page:
INT35-C. Use correct integer precisions
Page:
DCL00-C. Const-qualify immutable objects
Page:
API03-C. Create consistent interfaces and capabilities across related functions
Page:
FIO38-C. Do not copy a FILE object
Page:
EXP07-C. Do not diminish the benefits of constants by assuming their values in expressions
Page:
CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction
Page:
PRE07-C. Avoid using repeated question marks
Page:
INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
Page:
DCL17-C. Beware of miscompiled volatile-qualified variables
Page:
Conformance Testing
Page:
POS44-C. Do not use signals to terminate threads
Page:
PRE01-C. Use parentheses within macros around parameter names
Page:
DCL08-C. Properly encode relationships in constant definitions
Page:
FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call
Page:
FLP04-C. Check floating-point inputs for exceptional values
Page:
EXP35-C. Do not modify objects with temporary lifetime
Page:
FIO24-C. Do not open a file that is already open
Page:
POS37-C. Ensure that privilege relinquishment is successful
Page:
DCL15-C. Declare file-scope objects or functions that do not need external linkage as static
Page:
STR34-C. Cast characters to unsigned char before converting to larger integer sizes
Page:
ERR01-C. Use ferror() rather than errno to check for FILE stream errors
Page:
MEM30-C. Do not access freed memory
Page:
CON37-C. Do not call signal() in a multithreaded program
Page:
CON43-C. Do not allow data races in multithreaded code
Page:
INT14-C. Avoid performing bitwise and arithmetic operations on the same data
Page:
INT00-C. Understand the data model used by your implementation(s)
Page:
INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression
Page:
FLP00-C. Understand the limitations of floating-point numbers
Page:
CON31-C. Do not destroy a mutex while it is locked
Page:
Government Regulations
Page:
POS01-C. Check for the existence of links when dealing with files
Page:
ENV01-C. Do not make assumptions about the size of an environment variable
Page:
MEM03-C. Clear sensitive information stored in reusable resources
Page:
STR04-C. Use plain char for characters in the basic character set
Page:
DCL36-C. Do not declare an identifier with conflicting linkage classifications
Page:
INT01-C. Use rsize_t or size_t for all integer values representing the size of an object
Page:
PRE03-C. Prefer typedefs to defines for encoding non-pointer types
Page:
MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro
Page:
POS53-C. Do not use more than one mutex for concurrent waiting operations on a condition variable
Page:
Scope
Page:
DCL11-C. Understand the type issues associated with variadic functions
Page:
PRE08-C. Guarantee that header file names are unique
Page:
CC. Undefined Behavior
Page:
ERR06-C. Understand the termination behavior of assert() and abort()
Page:
FIO21-C. Do not create temporary files in shared directories
Page:
EXP08-C. Ensure pointer arithmetic is used correctly
Page:
MSC18-C. Be careful while handling sensitive data, such as passwords, in program code
Page:
EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement
Page:
FIO20-C. Avoid unintentional truncation when using fgets() or fgetws()
Page:
INT32-C. Ensure that operations on signed integers do not result in overflow
Page:
FLP07-C. Cast the return value of a function that returns a floating-point type
Page:
CON09-C. Avoid the ABA problem when using lock-free algorithms
Page:
MEM35-C. Allocate sufficient memory for an object
Page:
SIG30-C. Call only asynchronous-safe functions within signal handlers
Page:
DCL22-C. Use volatile for data that cannot be cached
Page:
FIO44-C. Only use values for fsetpos() that are returned from fgetpos()
Page:
MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap
Page:
EXP20-C. Perform explicit tests to determine success, true and false, and equality
Page:
ARR38-C. Guarantee that library functions do not form invalid pointers
Page:
INT10-C. Do not assume a positive remainder when using the % operator
Page:
EXP46-C. Do not use a bitwise operator with a Boolean-like operand
Page:
DCL12-C. Implement abstract data types using opaque types
Page:
INT04-C. Enforce limits on integer values originating from tainted sources
Page:
CON04-C. Join or detach threads even if their exit status is unimportant
Page:
POS52-C. Do not perform operations that can block while holding a POSIX lock
Page:
CON08-C. Do not assume that a group of calls to independently atomic methods is atomic
Page:
FIO45-C. Avoid TOCTOU race conditions while accessing files
Page:
POS05-C. Limit access to files by creating a jail
Page:
STR03-C. Do not inadvertently truncate a string
Page:
PRE06-C. Enclose header files in an include guard
Page:
ERR07-C. Prefer functions that support error checking over equivalent functions that don't
Page:
STR06-C. Do not assume that strtok() leaves the parse string unchanged
Page:
FIO47-C. Use valid format strings
Page:
FIO46-C. Do not access a closed file
Page:
FLP01-C. Take care in rearranging floating-point expressions
Page:
INT09-C. Ensure enumeration constants map to unique values
Page:
ARR32-C. Ensure size arguments for variable length arrays are in a valid range
Page:
DCL23-C. Guarantee that mutually visible identifiers are unique
Page:
STR05-C. Use pointers to const when referring to string literals
Page:
ARR37-C. Do not add or subtract an integer to a pointer to a non-array object
Page:
INT02-C. Understand integer conversion rules
Page:
CON36-C. Wrap functions that can spuriously wake up in a loop
Page:
DCL20-C. Explicitly specify void when a function accepts no arguments
Page:
DCL37-C. Do not declare or define a reserved identifier
Page:
SIG02-C. Avoid using signals to implement normal functionality
Page:
EXP45-C. Do not perform assignments in selection statements
Page:
MSC33-C. Do not pass invalid data to the asctime() function
Page:
ERR03-C. Use runtime-constraint handlers when calling the bounds-checking interfaces
Page:
ERR00-C. Adopt and implement a consistent and comprehensive error-handling policy
Page:
EXP39-C. Do not access a variable through a pointer of an incompatible type
Page:
FLP30-C. Do not use floating-point variables as loop counters
Page:
POS35-C. Avoid race conditions while checking for the existence of a symbolic link
Page:
PRE31-C. Avoid side effects in arguments to unsafe macros
Page:
MSC07-C. Detect and remove dead code
Page:
DCL07-C. Include the appropriate type information in function declarators
Page:
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
Page:
DCL03-C. Use a static assertion to test the value of a constant expression
Page:
ERR05-C. Application-independent code should provide error detection without dictating error handling
Page:
MEM04-C. Beware of zero-length allocations
Page:
SIG35-C. Do not return from a computational exception signal handler
Page:
History
Page:
CON32-C. Prevent data races when accessing bit-fields from multiple threads
Page:
PRE32-C. Do not use preprocessor directives in invocations of function-like macros
Page:
EXP43-C. Avoid undefined behavior when using restrict-qualified pointers
Page:
FIO09-C. Be careful with binary data when transferring data across systems
Page:
API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size
Page:
INT13-C. Use bitwise operators only on unsigned operands
Page:
POS39-C. Use the correct byte ordering when transferring data between systems
Page:
WIN04-C. Consider encrypting function pointers
SEI CERT Oracle Coding Standard for Java (1)
Page:
Rule BB. Glossary
SEI CERT C++ Coding Standard (5)
Page:
CON55-CPP. Preserve thread safety and liveness when using condition variables
Page:
CTR55-CPP. Do not use an additive operator on an iterator if the result would overflow
Page:
CON54-CPP. Wrap functions that can spuriously wake up in a loop
Page:
How this Coding Standard Is Organized
Page:
MEM50-CPP. Do not access freed memory
Hierarchy
Parent Page
Page:
4 Back Matter
Labels
Global Labels (2)
bm
section
Recent Changes
Time
Editor
Nov 06, 2024 10:24
David Svoboda
View Changes
C17 ref as well as C24 ref
Oct 17, 2024 08:43
Caden Milne
View Changes
Added bibliography entry and anchors for the 2024 edition of "Programming Languages-C" from ISO.
Sep 12, 2019 21:48
David Svoboda
View Changes
fixed howard 2002 link
Sep 12, 2019 21:47
David Svoboda
View Changes
fixed Howard 2002 link
Apr 04, 2019 08:52
Yozo TODA
URL of [McCluskey 2001] revised.
View Page History
Outgoing Links
External Links (195)
amddevcentral.com/Resources/archive/documentation/articles/…
www.cs.berkeley.edu/%7Edaw/papers/setuid-usenix02.pdf
www.stack.nl/%7Emarcov/buildfaq.pdf
www.ibm.com/developerworks/aix/library/au-hook_duttaC.html
www.kb.cert.org/vulnotes/id/654390
www.open-std.org/JTC1/SC22/WG14/www/docs/n1173.pdf
www.doc.ic.ac.uk/lab/cplus/c++.rules/
iase.disa.mil/stigs/Documents/U_Application_Security_and_De…
www.kb.cert.org/vulnotes/id/568148
www.kernel.org/doc/man-pages/online_pages.html
www.kb.cert.org/vuls/id/925211
www.hackersdelight.org/
www.kb.cert.org/vuls/id/159523
www.unicode.org/versions/Unicode6.2.0/
www.gnu.org/software/pth/
www.securesoftware.com/process/
cve.mitre.org/
cwe.mitre.org/
www.leshatton.org/Documents/ISOC_subset.pdf
www.hpenterprisesecurity.com/vulncat/en/vulncat/intro.html
www.cl.cam.ac.uk/%7Emgk25/unicode.html
www.us-cert.gov/cas/techalerts/index.html
www.gnu.org/software/libc/manual/
www.cert.org/secure-coding/
www.slideshare.net/amiable_indian/unusual-bugs
www.faqs.org/rfcs/rfc2279.html
www.opengroup.org/onlinepubs/009695399/toc.htm
www.owasp.org/index.php/Using_freed_memory
www.open-std.org/jtc1/sc22/wg14/www/docs/n791.htm
https://www.securecoding.cert.org/confluence/display/seccod…
www.open-std.org/jtc1/sc22/wg14/www/docs/n1248.pdf
www.cert.org/books/secure-coding
kqueue.org/blog/2012/06/25/more-randomness-or-less/
ftp://ftp.rfc-editor.org/in-notes/rfc2828.txt
www.informit.com/store/product.aspx?isbn=0201633922
www.network-theory.co.uk/docs/gccintro/index.html
www.unix.org/whitepapers/64bit.html
resources.sei.cmu.edu/library/asset-view.cfm?assetid=52665
www.embedded.com/columns/programmingpointers/9900661?_reque…
www.cppreference.com/
lwn.net/2000/1221/a/sec-tmp.php3
www.cert.org/advisories/CA-2003-16.html
www.kb.cert.org/vulnotes/id/743092
www.felinemenace.org/papers/UBehavior.zip
developer.apple.com/documentation/Security/Conceptual/Secur…
web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-rec…
www.brainbell.com/tutors/c/Advice_and_Warnings_for_C/
msdn2.microsoft.com/en-us/library/fw5abdx6%28VS.80%29.aspx
www.openbsd.org/cgi-bin/man.cgi
www.fsf.org
https://www.usenix.org/system/files/login/articles/1789-mcc…
www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Flake.…
www.avertlabs.com/research/blog/index.php/2008/02/13/analyz…
seclists.org/bugtraq/1998/Aug/0071.html
www.gotw.ca/publications/c++cs.htm
www.drdobbs.com/go-parallel/article/showArticle.jhtml;jsess…
www.kb.cert.org/vuls/id/834865
www.kb.cert.org/vulnotes/id/196240
www.informit.com/store/product.aspx?isbn=0321118847
www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/
www.embedded.com/columns/programmingpointers/164900888?_req…
www.lysator.liu.se/c/duffs-device.html
www.eecs.berkeley.edu/%7Edaw/papers/setuid-login08b.pdf
www.keil.com/support/man/docs/armlib/armlib_bihbjiea.htm
https://tools.ietf.org/html/rfc6520
www.gnu.org/prep/standards/standards.html
www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf
www.cgisecurity.com/lib/protecting-sensitive-data.html
refspecs.freestandards.org/LSB_3.1.0/LSB-Core-generic/LSB-C…
gcc.gnu.org/bugs/#nonbugs_c
www.open-std.org/jtc1/sc22/wg21/docs/papers/1993/N0389.asc
www.informit.com/articles/article.aspx?p=2088511
www.spinellis.gr/codequality
h30097.www3.hp.com/docs/wpapers/spoof_wp/symlink_external.p…
blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-…
www.securiteam.com/windowsntfocus/5MP0D0UKKO.html
www.open-std.org/jtc1/sc22/wg14/www/docs/n1290.pdf
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.208.4289&…
c-faq.com/
www.kb.cert.org/vulnotes/id/649732
www.embedded.com/electronics-blogs/programming-pointers/400…
pbma.nasa.gov/docs/public/pbma/general/guidbook.doc
cert.uni-stuttgart.de/advisories/calloc.php
www.kb.cert.org/vulnotes/id/881872
www.drdobbs.com/cpp/232800444
www.mkssoftware.com/docs/api_index.asp/
samate.nist.gov/docs/source_code_security_analysis_spec_SP5…
www.kb.cert.org/vuls/id/720951
www.kb.cert.org/vuls/id/623332
people.redhat.com/drepper/defprogramming.pdf
www.opengroup.org/onlinepubs/7990989775/toc.htm
web.archive.org/web/20030919012916/http://www.cert.org/cong…
https://www.viva64.com/en/b/0388/
ftp://download.intel.com/software/opensource/libraries/ieee…
www.opengroup.org/onlinepubs/9699919799
www.open-std.org/jtc1/sc22/wg14/www/docs/n1330.pdf
seclists.org/bugtraq/1997/Jan/0011.html
www.sei.cmu.edu/publications/documents/09.reports/09tn023.h…
xorl.wordpress.com/
https://www.securecoding.cert.org/confluence/display/seccod…
www.cs.auckland.ac.nz/%7Epgut001/pubs/secure_del.html
samate.nist.gov/SRD/
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.126.9257&…
www.kb.cert.org/vulnotes/id/551436
www.oracle.com/technetwork/server-storage/solaris/cc-restri…
www.misra.org.uk/
ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=159342
https://computing.llnl.gov/tutorials/pthreads/#Mutexes
www.snort.org/assets/164/sf_HTTP_IDS_evasions.pdf
gcc.gnu.org/ml/gcc-help/2005-11/msg00141.html
cansecwest.com/csw07/Vector-Rewrite-Attack.pdf
www.kb.cert.org/vulnotes/id/286468
www.open-std.org/jtc1/sc22/wg14/www/docs/n1080.pdf
www.ietf.org/rfc/rfc1813.txt
www.kb.cert.org/vuls/id/439395
cnst.livejournal.com/24040.html
www.greenend.org.uk/rjk/2001/02/cfu.html
plan9.bell-labs.com/sys/doc/utf.pdf
docs.sun.com/source/806-3568/ncg_goldberg.html
www-128.ibm.com/developerworks/linux/library/l-calls.html
https://www.amazon.com/Writing-Secure-Second-Developer-Prac…
en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report
blogs.23.nu/ilja/stories/12551/
undeadly.org/cgi?action=article&sid=20061027031811
lifecs.likai.org/2009/01/making-null-pointer-reference-lega…
secunia.com/advisories/10635/
cellperformance.beyond3d.com/articles/2006/06/understanding…
winjade.net/2009/01/lesson-on-infinite-loops/
phrack.org/archives/issues/63/14.txt
docs.sun.com/source/819-3688/
www.open-std.org/JTC1/SC22/WG11/
www.theregister.co.uk/2009/07/17/linux_kernel_exploit/
www.securityfocus.com/advisories/198
https://buildsecurityin.us-cert.gov/
www.unicode.org/standard/standard.html
www.open-std.org/jtc1/sc22/wg14/www/docs/n1539.pdf
https://buildsecurityin.us-cert.gov/bsi/home.html
www.cert.org/books/secure-coding/LWM%203-11%20%28Seacord%29…
www.embedded.com/electronics-blogs/programming-pointers/440…
www.greenend.org.uk/rjk/2003/03/inline.html
www.microsoft.com/technet/security/bulletin/MS03-026.mspx
doi.acm.org/10.1145/956641.956647
tigcc.ticalc.org/doc/keywords.html
https://iasecontent.disa.mil/stigs/zip/U_ASD_V4R8_STIG.zip
www.open-std.org/jtc1/sc22/wg14/www/C99RationaleV5.10.pdf
www.openbsd.org/papers/openssh-measures-asiabsdcon2007.pdf
www.cert.org/stats/cert_stats.html
www.open-std.org/jtc1/sc22/wg21/docs/papers/2004/n1720.html
msdn.microsoft.com/en-us/default.aspx
developer.amd.com/
https://wci.llnl.gov/codes/smartlibs/UCRL-JRNL-208636.pdf
www.embedded.com/story/OEG20011016S0116
www.embedded.com/columns/programmingpointers/9900402
mail-index.netbsd.org/tech-kern/2003/08/11/0001.html
secureapps.blogspot.com/2006/10/security-considerations-whe…
web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree…
www.owasp.org/index.php/Double_Free
portal.acm.org/citation.cfm?id=1450058.1450093
seclists.org/dailydave/2010/q2/27
gcc.gnu.org/onlinedocs
www.embedded.com/2000/0009/0009pp.htm
www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20con…
www.embedded.com/story/OEG20020124S0117
stackoverflow.com/questions/559061/should-i-return-true-fal…
www.opengroup.org/onlinepubs/009695399/
www.kb.cert.org/vuls/id/837857
openmp.org/wp/
standards.iso.org/ittf/PubliclyAvailableStandards/index.htm…
resources.sei.cmu.edu/asset_files/TechnicalReport/2006_005_…
groups.google.com/group/comp.lang.c/browse_thread/thread/89…
www.open-std.org/jtc1/sc22/wg14/www/docs/n1396.htm
www.opengroup.org/onlinepubs/9699919799/toc.htm
www.netrino.com/Articles/OffsetOf/index.php
winjade.net/
home.att.net/%7Ejackklein/c/code/strtol.html
www.embedded.com/columns/programmingpointers/197008821
www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detai…
https://buildsecurityin.us-cert.gov/daisy/bsi/articles/know…
www.knosof.co.uk/cbook/
www.securityfocus.com/bid/10538/discuss
grouper.ieee.org/groups/754/
www.phy.duke.edu/%7Ergb/General/c_book/c_book/index.html
https://www.securecoding.cert.org/confluence/display/seccod…
www.dss.mil/documents/odaa/nispom2006-5220.pdf
lcamtuf.coredump.cx/signals.txt
www.kb.cert.org/vuls/id/162289
www.arm.com/documentation/books/4975.html
ieeexplore.ieee.org/servlet/opac?punumber=6506089
www.stroustrup.com/JSF-AV-rules.pdf
blog.existentialize.com/diagnosis-of-the-openssl-heartbleed…
https://buildsecurityin.us-cert.gov/daisy/bsi/resources/dhs…
iasecontent.disa.mil/stigs/zip/Aug2016/U_ASD_V4R1_STIG.zip
bruce-eckel.developpez.com/livres/cpp/ticpp/v2/
www.caravan.net/ec2plus/guide.html
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.169.2051&…
SEI CERT C Coding Standard (1)
Home page:
SEI CERT C Coding Standard
Overview
Content Tools
{"serverDuration": 3394, "requestCorrelationId": "fcb11b276cca3b34"}