<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65ecc869-8fa4-4cfe-9c05-598cd33a6fe8"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c29ddecd-bfab-4ca8-a9a6-14b0c4b7eed3"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c66dfab-d7f4-4c7b-8bfa-d8b0d165c7c4"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
[Hatton 04] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06832f54-7b31-4d16-b2f9-d40012def6e1"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e476d23c-3087-4722-a74c-1a7898357907"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire,UK. October 2004. ISBN 0 9524156 4
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ebc1102-4ff5-4d59-ae49-6ca7cb44cda3"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset (SRD).See http://samate.nist.gov/SRD/srdFiles/
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc9836b4-01b8-4776-8e5d-2adc9a469ee6"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b07f2a59-ae31-438d-8191-19d1b3f4d73d"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See http://www.cert.org/books/secure-codingfor news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b37e184d-4348-48f4-b326-d9bc2b43b743"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Steve Summit. C Programming FAQs: Frequently Asked Questions. Addison-Wesley, 1995. ISBN: 0201845199.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6f4f89d-72ee-4019-a821-b69326069106"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.