1 |
LDRA Software Technology, http://www.ldra.com/testbed.asp
|
2 |
MISRA-C 2004, Guidelines for the use of the C language in critical systems, MISRA Limited, 2004
|
3 |
김명호, "고품질 SW를 위한 Coding Rule과 정적도구 활용 및 사례", Secure Coding Standard 단기강좌, 동국대학교, 2009. 12
|
4 |
Matt Bishop, Computer Security: Art and Science, Addison-Wesley, 2002
|
5 |
Fortify, http://www.fortify.com
|
6 |
CERT Advisory CA-2003-2-W32/Blaster worm, http://www.cert.org/advisories/CA-2003-20.html, 2003
|
7 |
Splint-Secure Programming Lint, http://www.splint.org
|
8 |
Klocwork Insight, http://www.klocwork.com/products/insight
|
9 |
Aleph One, Smashing The Stack For Fun And Profit, Phrack Magazine vol 7, no 49, 1996
|
10 |
한근희, "시큐어코딩 표준과 전자정부 시스템", Secure Coding Standard 단기강좌, 동국대학교, 2009. 12
|
11 |
T. Eisenberg, D. Gries, etal., "The Cornell commission: on Morris and the worm," CACM vol 32, no 6, pp. 706-709, 1989
DOI
ScienceOn
|
12 |
R. Seacord, The CERT C Secure Coding Standard, Addison-Wesley, 2009
|
13 |
ROSE, http://www.rosecompiler.org
|
14 |
CWE, http://cwe.mitre.org
|