Macro and security
Appearance
Macro and security ...
References
1. Ernst, M.D., Badros, G.J., Notkin, D.: An empirical analysis of C preprocessoruse. IEEE Transactions on Software Engineering 2. Kohlbecker, E., Friedman, D.P., Felleisen, M., Duba, B.
Hygienic macro expansion. In: ACM Conference on LISP and Functional Programming, LFP (1986)
3. Weise, D., Crew, R.
Programmable syntax macros. In: ACM Conference on Pro-gramming Language Design and Implementation, PLDI (1993)
4. Clinger, W., Rees, J.
Macros that work. In: ACM Symposium on Principles of Programming Languages, POPL (1991)
5. Possible macro virus attacks and how to prevent them 6. Interpreter with virtualized interface 7. Mxec
parallel processing with an advanced macro facility
8. Pointcuts and advice in higher-order languages 9. A type-safe macro system for XML 10. Macros as multi-stage computations: type-safe, generative, binding macros in MacroML