1. Apple Inc.: Secure Coding Guide, 2014-02-11 edn. (2006–2014).
https://developer.apple.com/library/mac/documentation/Security/Conceptual/SecureCodingGuide/
2. Arnold, K.: Programmers are people, too. ACM Queue 3(5), 54–59 (2005)
3. Bishop, M.: How to write a setuid program. Login 12(1), 5–11 (1987)
4. Cappos, J., Zhuang, Y., Oliveira, D., Rosenthal, M., Yeh, K.C.: Vulnerabilities as blind spots in developer’s heuristic-based decision-making processes. In: Proceedings of New Security Paradigms Workshop, NSPW 2014, pp. 53–62. ACM, New York, NY, USA (2014)
5. Chen, H., Wagner, D., Dean, D.: Setuid demystified. In: USENIX Security Symposium, pp. 171–190 (2002)