<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0955d468-1d32-4630-8343-ac7243acf1f1"><ac:parameter ac:name="">Burch 06</ac:parameter></ac:structured-macro>
[Burch 06] Hal Burch, Fred Long, Robert Seacord. Specifications for Managed Strings. May 2006. CMU/SEI-2006-TR-006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e34c7b01-58b8-4156-81e1-985f1e6f7408"><ac:parameter ac:name="">CERT 06</ac:parameter></ac:structured-macro>
[CERT 06] CERT. Managed String Library (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c9ef4b3-fb5d-410a-b0a8-bf3d6c2bb9a9"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro>
[Graf 03] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8073b60b-cde6-46e3-b47e-d560d46254e4"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro>
[Hatton 04] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca9ff831-ad34-4768-937e-3979d0bad41c"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition, 1999.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92f9cf5b-bcc9-489d-ad23-37b540ffe4f3"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro>
[ISO/IEC TR 24731-2006] ISO/IEC TR 24731. Extensions to the C Library, — Part I: Bounds-checking interfaces. April, 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df5d9fdf-e7a1-4f3d-96ea-07ee7cc0e65f"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro>
[Kerrighan 88] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1cbeb30-8f2e-4d21-91d2-5c18e2d62d66"><ac:parameter ac:name="">Klein 02</ac:parameter></ac:structured-macro>
[Klein 02] Klein, Jack. Bullet Proof Integer Input Using strtol(). http://home.att.net/~jackklein/c/code/strtol.html (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45e00194-c8f3-4b4f-95bb-0c31a4153c60"><ac:parameter ac:name="">mercy</ac:parameter></ac:structured-macro>
[mercy] mercy. Exploiting Uninitialized Data. http://www.felinemenace.org/papers/UBehavior.zip (January 2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="908f8299-5b24-41fe-a4aa-07db543a8319"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>
[MISRA 04] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68264dbd-0999-4bb6-a67b-e2e8388e9972"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro>
[NASA-GB-1740.13] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a7ec60e-4146-41f7-b097-2cca3b68faed"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>
[NIST 06] NIST. SAMATE Reference Dataset (SRD).See http://samate.nist.gov/SRD/srdFiles/
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33a88f83-e09e-4bc2-8703-d25f138b9a60"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro>
[Plum 89] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1fafa11-69f9-49c5-bf1d-ec8221581df7"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>
[Plum 91] Thomas Plum, Dan Saks. C++ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06c3b9cf-e4b2-4663-87b5-d5a5903038c3"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc7f5b17-dc41-4f9c-87d8-62c84ac50dee"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro>
[Seacord 05a] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See http://www.cert.org/books/secure-coding for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f940433f-ad4f-445b-abe7-b345ed350ed3"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
[Seacord 05b] Seacord, R. Managed String Library for C. C/C++ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c40bb4f6-897b-4791-8fe6-5ef1795dd0da"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro>
[Summit 95] Summit, Steve. C Programming FAQs: Frequently Asked Questions. Boston, MA: Addison-Wesley, 1995 (ISBN 0201845199).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73dd6ef0-fb99-4cd5-b4b4-4208ef634c32"><ac:parameter ac:name="">Summit 05</ac:parameter></ac:structured-macro>
[Summit 05] Summit, Steve. comp.lang.c Frequently Asked Questions. http://c-faq.com/ (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eaeaa324-0077-4d10-8453-616a09600c1e"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>
[Viega 03] Viega, John & Messier, Matt. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46265299-8c2b-4637-938d-20c03f20f5c0"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>
[Warren 02] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654.