<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8710236d-153d-4744-b023-4700a40cc0c6"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
[Burch 06] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="629c4663-d2ac-46ee-a240-b4f9ceb4356b"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
[Graf 03] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b092aec5-ef44-4104-9de4-2684b5d5efb3"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
[Hatton 04] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f7ee2fa-a3fa-4709-a6b9-3f91dfe1e7e8"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3beee641-6ff7-4021-9e51-74202eb9193a"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50229793-b8e4-4683-80f7-0577a7daf633"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e8d9e78-0ce4-4d74-977e-8227899a8e25"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
[mercy] mercy. Exploiting Uninitialized Data. http://www.felinemenace.org/papers/UBehavior.zip (January 2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e17918af-3033-4b71-b78d-d2d20f1230f9"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c13a965-f295-49da-9cc0-b4e92487c59c"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
[NASA-GB-1740.13] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="036c95ca-de11-47cb-bdfa-9690a26ab6d7"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset (SRD).See http://samate.nist.gov/SRD/srdFiles/
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d452266d-65db-4a15-a857-7a4da110474b"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69598cd7-726f-457d-9a32-374bf8102324"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
[Plum 91] Thomas Plum, Dan Saks. C++ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cadad4bc-90a3-42c2-84a4-c98436d8a8e7"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7769ce0-539f-4098-ad6f-5bf37efae7dc"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
[Seacord 05a] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See http://www.cert.org/books/secure-coding for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f0cfeef-05ec-4a28-825a-1147f0a0c73d"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
[Seacord 05b] Seacord, R. Managed String Library for C. C/C++ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="363447c9-2a89-4d7c-b6f3-658293486cc4"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Summit, Steve. C Programming FAQs: Frequently Asked Questions. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd7dbeca-86f6-48e2-bda1-53b7fe575677"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
[Summit 05] Summit, Steve. comp.lang.c Frequently Asked Questions. http://c-faq.com/ (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa2b61f3-1e3a-4e0e-b02d-db8af88a2e7c"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.