Jump to content

Macro and security

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Anthlerouge (talk | contribs) at 17:50, 30 September 2012 (Created page with '{{Userspace draft|source=ArticleWizard|date={{Subst:CURRENTMONTHNAME}} {{Subst:CURRENTYEAR}}}} <!-- Please leave this line alone! --> '''Macro and security''' ....'). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)


Macro and security ...


References

1. Ernst, M.D., Badros, G.J., Notkin, D.: An empirical analysis of C preprocessoruse. IEEE Transactions on Software Engineering 2. Kohlbecker, E., Friedman, D.P., Felleisen, M., Duba, B.

   Hygienic macro expansion. In: ACM Conference on LISP and Functional Programming, LFP (1986)

3. Weise, D., Crew, R.

   Programmable syntax macros. In: ACM Conference on Pro-gramming Language Design and Implementation, PLDI (1993)

4. Clinger, W., Rees, J.

   Macros that work. In: ACM Symposium on Principles of Programming Languages, POPL (1991)

5. Possible macro virus attacks and how to prevent them 6. Interpreter with virtualized interface 7. Mxec

   parallel processing with an advanced macro facility

8. Pointcuts and advice in higher-order languages 9. A type-safe macro system for XML 10. Macros as multi-stage computations: type-safe, generative, binding macros in MacroML