You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18a28abc-5796-4c98-97c0-952342913f69"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
[Burch 06] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd71b556-4ace-4f07-8958-86082b8e1455"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro>
[CERT 06] CERT. Managed String Library (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="448f5cb5-7601-4384-af9f-289815e2f30d"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
[Graf 03] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cb685b1-f1ec-4a98-84db-4677221814ba"><ac:parameter ac:name="">Haddad 05</ac:parameter></ac:structured-macro>
[Haddad 05] Haddad, Ibrahim. "Secure Coding in C and C++: An interview with Robert Seacord, senior vulnerability analyst at CERT." Linux World Magazine, November, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="027e2db1-c7a7-41c2-a341-cf3c1932e936"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
[Hatton 04] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="91838848-10ad-4b2b-9bf8-9d0473aa69c3"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a300ab14-2305-4639-9c97-85cdf4c2c4dc"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c894e7f-0aef-4529-b02c-53a12421d508"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e83b8ccf-c757-48f1-a825-cf3397b77186"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro>
[Klein 02] Klein, Jack. Bullet Proof Integer Input Using strtol(). http://home.att.net/~jackklein/c/code/strtol.html (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7aad291f-596f-4993-ac95-6b91031c7c4a"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
[mercy] mercy. Exploiting Uninitialized Data. http://www.felinemenace.org/papers/UBehavior.zip (January 2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0b30976-ce45-4bb4-98f7-12616653e287"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54da0e38-1e9b-469c-8c77-875cc0605e97"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
[NASA-GB-1740.13] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25405679-852b-49b4-9556-4212ff25d223"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset (SRD).See http://samate.nist.gov/SRD/srdFiles/

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23478c65-1f40-4906-b1b0-5f231b3bf763"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a93bdc4-7504-46a9-a7cb-5769ead4e52d"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
[Plum 91] Thomas Plum, Dan Saks. C++ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7cb4ea4-006d-4deb-b52d-8f45a308ff76"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40db124c-8862-4c7b-ad31-232893e28190"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
[Seacord 05a] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See http://www.cert.org/books/secure-coding for news and errata.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccbcb9f4-6d0f-48da-9c8d-b2c8d137a49b"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
[Seacord 05b] Seacord, R. Managed String Library for C. C/C++ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="272da9d2-8d9c-45c8-846c-9b8d9bcf63f4"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Summit, Steve. C Programming FAQs: Frequently Asked Questions. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdca0a0f-2fc0-4fce-9c0f-444d42280e06"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
[Summit 05] Summit, Steve. comp.lang.c Frequently Asked Questions. http://c-faq.com/ (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1605bcb8-b5e3-48af-853d-63fe05c20c3d"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>
[Viega 03] Viega, John & Messier, Matt. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef4407ed-9fbe-4992-b8ce-01b29762bfa5"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.

  • No labels