1 |
DAPA, "Weapon System Software Development and Management Guide," 2016
|
2 |
June-sung Choi, Woo-je Kim, Won-hyung Park and Kwang-ho Kook, "Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection," The Journal of Korean Institute of Communications and Information Sciences, Vol. 38, No. 8, pp. 651-662, 2013. DOI : 10.7840/kics.2013.38C.8.651
|
3 |
Microsoft, "MS SDL 5.2," https://msdn.microsoft.com/en-us/library/windows/desktop/cc307748.aspx
|
4 |
James Ransome, "Core software security: security at the source," CRC press, 2013
|
5 |
Brandon Bray, Compiler Security Checks In Depth, https://msdn.microsoft.com/en-us/library/aa290051(v=vs.71).aspx.
|
6 |
Microsoft, "Security in the .NET Framework," https://msdn.microsoft.com/en-us/library/fkytk30f(v=vs.110).aspx
|
7 |
Nishant Sivakumar, "C++/CLI in Action," Manning, 2007
|
8 |
"C Secure Coding Guide", Ministry of the Administration, 2012
|
9 |
Microsoft CryptoAPI : https://en.wikipedia.org/wiki/Microsoft_CryptoAPI
|
10 |
RFC 4086(Randomness Requirements for Security)
|
11 |
Dieharder Random Number Tests, http://www.phy.duke.edu/-rgb/General/dieharder.php
|
12 |
Bjarne Stroustrup, "C++ Programming Language, The, 4th Edition," Addison-Wesley Professional, 2013
|
13 |
Design Guidelines for Developing Class Libraries, https://msdn.microsoft.com/en-us/library/ms229042(v=vs.100).aspx
|
14 |
OWASP, "OWASP Secure Coding Practices - Quick Reference Guide," 2010
|
15 |
CryptGenRandom : https://en.wikipedia.org/wiki/CryptGenRandom#Using_RNGCryptoServiceProvider
|