Coverity Static Analysis Support for MISRA Coding Standards

Similar documents
Synopsys Static Analysis Support for SEI CERT C Coding Standard

Certification Authorities Software Team (CAST) Position Paper CAST-25

MISRA C:2012 WHITE PAPER

Procurement Language for Supply Chain Cyber Assurance

CERT C++ COMPLIANCE ENFORCEMENT

MISRA C:2012. by Paul Burden Member of MISRA C Working Group and co-author of MISRA C:2012. February 2013

Choosing the Right Solution for Strategic Deployment of Encryption

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석

Hardening Attack Vectors to cars by Fuzzing

TechValidate Survey Report: SaaS Application Trends and Challenges

The data quality trends report

STORAGE EFFICIENCY: MISSION ACCOMPLISHED WITH EMC ISILON

Best Practices in Securing a Multicloud World

Product Security Program

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

Network Time Synchronization Why It is Crucial for Regulatory Compliance in Enterprise Applications

Managing Supply Chain Data for Modern Aircraft. Making the Transition to S1000D

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Best Practices Process & Technology. Sachin Dhiman, Senior Technical Consultant, LDRA

Symantec Data Center Transformation

CocoBase Delivers TOP TEN Enterprise Persistence Features For JPA Development! CocoBase Pure POJO

Solution. Imagine... a New World of Authentication.

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Automating the Top 20 CIS Critical Security Controls

A Model-Based Reference Workflow for the Development of Safety-Related Software

Overview. Business value

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

Design Compiler Graphical Create a Better Starting Point for Faster Physical Implementation

By V-cubed Solutions, Inc. Page1. All rights reserved by V-cubed Solutions, Inc.

WELCOME TO TE CONNECTIVITY

WHITE PAPER CONTINUOUS MONITORING INTRODUCTION & CONSIDERATIONS PART 1 OF 3

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

WHITE PAPER. 10 Reasons to Use Static Analysis for Embedded Software Development

Introduction to Business continuity Planning

Automating Best Practices to Improve Design Quality

ConCert FAQ s Last revised December 2017

Coding Standards in FACE Conformance. John Thomas, Chris Edwards, and Shan Bhattacharya

Introduction to High-Performance Computing

Cybercrime e minacce informatiche: trend emergenti e soluzioni innovative u

Coding Standards in FACE Conformance. John Thomas, Chris Edwards, and Shan Bhattacharya

Frequently Asked Questions. AUTOSAR C++14 Coding Guidelines

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

HP Fortify Software Security Center

Quality Assurance and esecurity

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

PoE Midspans Harness Universal Power for Your Network. White Paper

Safety, Security, and Portability

AT60142H/HT. Rad-Hard 512Kx8 Very Low Power CMOS SRAM ERRATA-SHEET. Active Errata List. Errata History. Abbreviations. 1.

EXFO Acquires NetHawk

MISRA C:2012 Addendum 2

Symantec Security Monitoring Services

Medigate and Palo Alto Networks Integration

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

Tripwire State of Container Security Report

DATA CENTER SERVICES. A Higher Level of Service Expertise

From Design to Production

IDE for medical device software development. Hyun-Do Lee, Field Application Engineer

Symantec Network Access Control Starter Edition

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

VCS AMS. Mixed-Signal Verification Solution. Overview. testing with transistor-level accuracy. Introduction. Performance. Multicore Technology

Office 365 Buyers Guide: Best Practices for Securing Office 365

Physical Security Reliability Standard Implementation

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

This is a preview - click here to buy the full publication GUIDE 51. Safety aspects Guidelines for their inclusion in standards. Second edition 1999

Cisco Technical Services Advantage

Key Considerations for Improving Performance And Virtualization in Microsoft SQL Server Environments

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A)

Smart Data Center Solutions

Open Text Fax Gateway Specifications and Implementation Scenarios

IBM Rational Rhapsody. IBM Rational Rhapsody Kit for ISO 26262, IEC 61508, IEC and EN Overview. Version 1.9

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

A Framework for Managing Crime and Fraud

Navigating ISO 9001:2015

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1

Symantec Security.cloud

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc.

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

Standard Development Timeline

Automated Continuous Verification & Validation for Automobile Software

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES

Symantec Network Access Control Starter Edition

Voluntary Product Accessibility Report

Cyber Attacks & Breaches It s not if, it s When

Cisco Wireless Video Surveillance: Improving Operations and Security

Embedded and Communications Group January 2010

Systems Alliance. VPP-1: Charter Document

Symantec Network Access Control Starter Edition

Don t Be the Developer Whose Rocket Crashes on Lift off LDRA Ltd

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

WIND RIVER DIAB COMPILER

Technical Brief. NVIDIA Storage Technology Confidently Store Your Digital Assets

Remote Key Loading Spread security. Unlock efficiency

Your network s path to its fiber future. Grow confidently with fiber solutions from an experienced partner

EXFO Electro-Optical Engineering Inc. Acquisition of gnubi communications

Transcription:

Coverity Static Analysis Support for MISRA Coding Standards Fully ensure the safety, reliability, and security of software written in C and C++ Overview Software is eating the world. Industries that have traditionally relied on mechanical, electronic, and analog control systems are increasingly replacing them with softwaredriven systems. The average car, for example, is expected to contain 300 million lines of code in the next decade, up from 100 million lines of code today. But with the growth of software comes the growth of software defects, which often manifest in these systems physically and tangibly with life-threatening consequences in the worst scenarios. Perhaps more importantly, malicious actors can deliberately trigger failures for their own purposes. Highly complex industries involve many vendors and suppliers simultaneously contributing to the software that goes into the final product. Every participant in this software supply chain must reach consensus on coding standards, defect reporting structures, and so on. The confluence of these two factors increasing complexity in software systems and longer software supply chains creates the demand for new tools. The MISRA C and C++ coding standards are widely used in safety-critical industries, such as automotive, medical, military, and aerospace. The standards provide a set of best practices for writing C and C++ code, facilitating the authorship of safe, secure, and portable code. With Coverity Static Analysis, Synopsys provides a comprehensive solution for MISRA standard compliance that is scalable from individual developers all the way to complex software supply chains.

MISRA C:2004 The MISRA C:2004 coding standard supports the C90 language specification. It was first released in 2004 and consists of 142 rules: 122 required and 20 advisory. Coverity covers the entire MISRA C:2004 standard.* * All rules that can be checked by static analysis are supported. MISRA C:2004 contains 11 rules that are not statically checkable, so a total of 131 are implemented (out of 142). MISRA C:2004 rule coverage Supported All Percent coverage All 131 142 92.3% Required 115 123 93.5% Advisory 16 19 84.2% MISRA C:2004 supported rules Rule 1.1 Required Yes Rule 1.2 Required Yes Rule 1.3 Required No This rule is not Rule 1.4 Required No This rule is not Rule 1.5 Required No This rule is not Rule 2.1 Required Yes Rule 2.2 Required Yes Rule 2.3 Required Yes Rule 2.4 Advisory Yes Rule 3.1 Advisory No This rule is not Rule 3.2 Advisory No This rule is not Rule 3.3 Advisory No This rule is not Rule 3.4 Required No This rule is not Rule 3.5 Required No This rule is not Rule 3.6 Required No This rule is not Rule 4.1 Required Yes Rule 4.2 Required Yes Rule 5.1 Required Yes Rule 5.2 Required Yes Rule 5.3 Required Yes Rule 5.4 Required Yes Rule 5.5 Advisory Yes Rule 5.6 Advisory Yes Rule 5.7 Advisory Yes Rule 6.1 Required Yes Rule 6.2 Required Yes Rule 6.3 Advisory Yes Rule 6.4 Required Yes Rule 6.5 Required Yes Rule 7.1 Required Yes Rule 8.1 Required Yes Rule 8.2 Required Yes Rule 8.3 Required Yes Rule 8.4 Required Yes Rule 8.5 Required Yes Rule 8.6 Required Yes Rule 8.7 Required Yes Rule 8.8 Required Yes 2

Rule 8.9 Required Yes Rule 8.10 Required Yes Rule 8.11 Required Yes Rule 8.12 Required Yes Rule 9.1 Required Yes Rule 9.2 Required Yes Rule 9.3 Required Yes Rule 10.1 Required Yes Rule 10.2 Required Yes Rule 10.3 Required Yes Rule 10.4 Required Yes Rule 10.5 Required Yes Rule 10.6 Required Yes Rule 11.1 Required Yes Rule 11.2 Required Yes Rule 11.3 Advisory Yes Rule 11.4 Advisory Yes Rule 11.5 Required Yes Rule 12.1 Advisory Yes Rule 12.2 Required Yes Rule 12.12 Required Yes Rule 12.13 Advisory Yes Rule 13.1 Required Yes Rule 13.2 Advisory Yes Rule 13.3 Required Yes Rule 13.4 Required Yes Rule 13.5 Required Yes Rule 13.6 Required Yes Rule 13.7 Required Yes Rule 14.1 Required Yes Rule 14.2 Required Yes Rule 14.3 Required Yes Rule 14.4 Required Yes Rule 14.5 Required Yes Rule 14.6 Required Yes Rule 14.7 Required Yes Rule 14.8 Required Yes Rule 14.9 Required Yes Rule 14.10 Required Yes Rule 15.0 Required Yes Rule 12.3 Required Yes Rule 12.4 Required Yes Rule 12.5 Required Yes Rule 12.6 Advisory Yes Rule 12.7 Required Yes Rule 12.8 Required Yes Rule 12.9 Required Yes Rule 12.10 Required Yes Rule 12.11 Advisory Yes Rule 15.1 Required Yes Rule 15.2 Required Yes Rule 15.3 Required Yes Rule 15.4 Required Yes Rule 15.5 Required Yes Rule 16.1 Required Yes Rule 16.2 Required Yes Rule 16.3 Required Yes Rule 16.4 Required Yes 3

Rule 16.5 Required Yes Rule 16.6 Required Yes Rule 16.7 Required Yes Rule 16.8 Required Yes Rule 16.9 Required Yes Rule 16.10 Required Yes Rule 17.1 Required Yes Rule 17.2 Required Yes Rule 17.3 Required Yes Rule 17.4 Required Yes Rule 17.5 Required Yes Rule 17.6 Required Yes Rule 18.1 Required Yes Rule 18.2 Required Yes Rule 18.3 Required No This rule is not Rule 18.4 Required Yes Rule 19.1 Advisory Yes Rule 19.2 Advisory Yes Rule 19.3 Required Yes Rule 19.4 Required Yes Rule 19.5 Required Yes Rule 19.6 Required Yes Rule 19.7 Advisory Yes Rule 19.9 Required Yes Rule 19.10 Required Yes Rule 19.11 Required Yes Rule 19.12 Required Yes Rule 19.13 Advisory Yes Rule 19.14 Required Yes Rule 19.15 Required Yes Rule 19.16 Required Yes Rule 19.17 Required Yes Rule 20.1 Required Yes Rule 20.2 Required Yes Rule 20.3 Required Yes Rule 20.4 Required Yes Rule 20.5 Required Yes Rule 20.6 Required Yes Rule 20.7 Required Yes Rule 20.8 Required Yes Rule 20.9 Required Yes Rule 20.10 Required Yes Rule 20.11 Required Yes Rule 20.12 Required Yes Rule 21.1 Required No No checker, but successful analysis run confirms compliance. Rule 19.8 Required Yes 4

MISRA C++:2008 The MISRA C++:2008 coding standard supports the C++ programming language as defined by the C++03 language specification. It was first released in June 2008 and consists of 228 rules: 198 required, 18 advisory, and 12 document. Coverity covers the full MISRA C++:2008 standard.** MISRA C++:2008 rule coverage Supported All Percent coverage All 215 228 94.3% Required 197 198 99.5% Advisory 18 19 100.0% Document 0 12 0.0% * All rules that can be checked by static analysis are supported. MISRA C++:2008 contains 13 rules that are not statically checkable, so a total of 215 are implemented (out of 228). MISRA C++:2008 supported rules Rule 0-1-1 Required Yes Rule 0-1-2 Required Yes Rule 0-1-3 Required Yes Rule 0-1-4 Required Yes Rule 0-1-5 Required Yes Rule 0-1-6 Required Yes Rule 0-1-7 Required Yes Rule 0-1-8 Required Yes Rule 0-1-9 Required Yes Rule 0-1-10 Required Yes Rule 0-1-11 Required Yes Rule 0-1-12 Required Yes Rule 0-2-1 Required Yes Rule 0-3-1 Document No Static analysis cannot determine whether the code was written in accordance to a particular development process. Rule 0-3-2 Required Yes Rule 0-4-1 Document No Documentation cannot be programmatically analyzed. Rule 0-4-2 Document No Documentation cannot be programmatically analyzed. Rule 0-4-3 Document No Compiler and library behaviors in regard to floating-point arithmetics are out of scope of static analysis. Rule 1-0-1 Required Yes Rule 1-0-2 Document No Compiler and linker behaviors are out of scope of static analysis. Rule 1-0-3 Document No Documentation cannot be programmatically analyzed. Rule 2-2-1 Document No Documentation cannot be programmatically analyzed. Rule 2-3-1 Required Yes Rule 2-5-1 Advisory Yes Rule 2-7-1 Required Yes Rule 2-7-2 Required Yes Rule 2-7-3 Advisory Yes Rule 2-10-1 Required Yes Rule 2-10-2 Required Yes Rule 2-10-3 Required Yes Rule 2-10-4 Required Yes Rule 2-10-5 Advisory Yes Rule 2-10-6 Required Yes 5

Rule 2-13-1 Required Yes Rule 2-13-2 Required Yes Rule 2-13-3 Required Yes Rule 2-13-4 Required Yes Rule 2-13-5 Required Yes Rule 3-1-1 Required Yes Rule 3-1-2 Required Yes Rule 3-1-3 Required Yes Rule 3-2-1 Required Yes Rule 3-2-2 Required Yes Rule 3-2-3 Required Yes Rule 3-2-4 Required Yes Rule 3-3-1 Required Yes Rule 3-3-2 Required Yes Rule 3-4-1 Required Yes Rule 3-9-1 Required Yes Rule 3-9-2 Advisory Yes Rule 3-9-3 Required Yes Rule 4-5-1 Required Yes Rule 4-5-2 Required Yes Rule 4-5-3 Required Yes Rule 4-10-1 Required Yes Rule 4-10-2 Required Yes Rule 5-0-1 Required Yes Rule 5-0-2 Advisory Yes Rule 5-0-3 Required Yes Rule 5-0-4 Required Yes Rule 5-0-5 Required Yes Rule 5-0-6 Required Yes Rule 5-0-7 Required Yes Rule 5-0-8 Required Yes Rule 5-0-9 Required Yes Rule 5-0-10 Required Yes Rule 5-0-11 Required Yes Rule 5-0-12 Required Yes Rule 5-0-13 Required Yes Rule 5-0-14 Required Yes Rule 5-0-15 Required Yes Rule 5-0-16 Required Yes Rule 5-0-17 Required Yes Rule 5-0-18 Required Yes Rule 5-0-19 Required Yes Rule 5-0-20 Required Yes Rule 5-0-21 Required Yes Rule 5-2-1 Required Yes Rule 5-2-2 Required Yes Rule 5-2-3 Advisory Yes Rule 5-2-4 Required Yes Rule 5-2-5 Required Yes Rule 5-2-6 Required Yes Rule 5-2-7 Required Yes Rule 5-2-8 Required Yes Rule 5-2-9 Advisory Yes Rule 5-2-10 Advisory Yes Rule 5-2-11 Required Yes Rule 5-2-12 Required Yes Rule 5-3-1 Required Yes Rule 5-3-2 Required Yes 6

Rule 5-3-3 Required Yes Rule 5-3-4 Required Yes Rule 5-8-1 Required Yes Rule 5-14-1 Required Yes Rule 5-17-1 Required No Static analysis cannot reason about highlevel semantics of the source code. Rule 5-18-1 Required Yes Rule 5-19-1 Advisory Yes Rule 6-2-1 Required Yes Rule 6-2-2 Required Yes Rule 6-2-3 Required Yes Rule 6-3-1 Required Yes Rule 6-4-1 Required Yes Rule 6-4-2 Required Yes Rule 6-4-3 Required Yes Rule 6-4-4 Required Yes Rule 6-4-5 Required Yes Rule 6-4-6 Required Yes Rule 6-4-7 Required Yes Rule 6-4-8 Required Yes Rule 6-5-1 Required Yes Rule 6-5-2 Required Yes Rule 6-5-3 Required Yes Rule 6-5-4 Required Yes Rule 6-5-5 Required Yes Rule 6-5-6 Required Yes Rule 6-6-1 Required Yes Rule 6-6-2 Required Yes Rule 6-6-3 Required Yes Rule 6-6-4 Required Yes Rule 6-6-5 Required Yes Rule 7-1-1 Required Yes Rule 7-1-2 Required Yes Rule 7-2-1 Required Yes Rule 7-3-1 Required Yes Rule 7-3-2 Required Yes Rule 7-3-3 Required Yes Rule 7-3-4 Required Yes Rule 7-3-5 Required Yes Rule 7-3-6 Required Yes Rule 7-4-1 Document No Documentation cannot be programmatically analyzed. Rule 7-4-2 Required Yes Rule 7-4-3 Required Yes Rule 7-5-1 Required Yes Rule 7-5-2 Required Yes Rule 7-5-3 Required Yes Rule 7-5-4 Advisory Yes Rule 8-0-1 Required Yes Rule 8-3-1 Required Yes Rule 8-4-1 Required Yes Rule 8-4-2 Required Yes Rule 8-4-3 Required Yes Rule 8-4-4 Required Yes Rule 8-5-1 Required Yes Rule 8-5-2 Required Yes Rule 8-5-3 Required Yes Rule 9-3-1 Required Yes Rule 9-3-2 Required Yes 7

Rule 9-3-3 Required Yes Rule 9-5-1 Required Yes Rule 9-6-1 Document No Documentation cannot be programmatically analyzed. Rule 9-6-2 Required Yes Rule 9-6-3 Required Yes Rule 9-6-4 Required Yes Rule 10-1-1 Advisory Yes Rule 10-1-2 Required Yes Rule 10-1-3 Required Yes Rule 10-2-1 Advisory Yes Rule 10-3-1 Required Yes Rule 10-3-2 Required Yes Rule 10-3-3 Required Yes Rule 11-0-1 Required Yes Rule 12-1-1 Required Yes Rule 12-1-2 Advisory Yes Rule 12-1-3 Required Yes Rule 12-8-1 Required Yes Rule 12-8-2 Required Yes Rule 14-5-1 Required Yes Rule 14-5-2 Required Yes Rule 14-5-3 Required Yes Rule 14-6-1 Required Yes Rule 14-6-2 Required Yes Rule 14-7-1 Required Yes Rule 14-7-2 Required Yes Rule 14-7-3 Required Yes Rule 14-8-1 Required Yes Rule 14-8-2 Advisory Yes Rule 15-0-1 Document No Documentation cannot be programmatically analyzed. Rule 15-0-2 Advisory Yes Rule 15-0-3 Required Yes Rule 15-1-1 Required Yes Rule 15-1-2 Required Yes Rule 15-1-3 Required Yes Rule 15-3-1 Required Yes Rule 15-3-2 Advisory Yes Rule 15-3-3 Required Yes Rule 15-3-4 Required Yes Rule 15-3-5 Required Yes Rule 15-3-6 Required Yes Rule 15-3-7 Required Yes Rule 15-4-1 Required Yes Rule 15-5-1 Required Yes Rule 15-5-2 Required Yes Rule 15-5-3 Required Yes Rule 16-0-1 Required Yes Rule 16-0-2 Required Yes Rule 16-0-3 Required Yes Rule 16-0-4 Required Yes Rule 16-0-5 Required Yes Rule 16-0-6 Required Yes Rule 16-0-7 Required Yes Rule 16-0-8 Required Yes Rule 16-1-1 Required Yes Rule 16-1-2 Required Yes Rule 16-2-1 Required Yes Rule 16-2-2 Required Yes 8

Rule 16-2-3 Required Yes Rule 16-2-4 Required Yes Rule 16-2-5 Advisory Yes Rule 16-2-6 Required Yes Rule 16-3-1 Required Yes Rule 16-3-2 Advisory Yes Rule 16-6-1 Document No Documentation cannot be programmatically analyzed. Rule 17-0-1 Required Yes Rule 17-0-2 Required Yes Rule 17-0-3 Required Yes Rule 17-0-4 Document No Static analysis cannot determine the compliance of a particular library with the MISRA standard, as the source code may not necessarily be available. Rule 17-0-5 Required Yes Rule 18-0-1 Required Yes Rule 18-0-2 Required Yes Rule 18-0-3 Required Yes Rule 18-0-4 Required Yes Rule 18-0-5 Required Yes Rule 18-2-1 Required Yes Rule 18-4-1 Required Yes Rule 18-7-1 Required Yes Rule 19-3-1 Required Yes Rule 27-0-1 Required Yes 9

MISRA C:2012 The MISRA C:2012 coding standard supports the C90 and C99 language specifications. MISRA C:2012 Amendment 1 was released in 2016 and consists of 173 guidelines: 156 rules and 17 directives. Coverity covers the entire MISRA C:2012 standard, including Amendment 1. In addition, checker implementations adhere to the Technical Corrigendum 1, released in July 2017.* MISRA C:2012 rule coverage Decidable Undecidable Subtotal Supported All Supported All Supported All All 119 119 51 54 170 173 98.3% Percent coverage Mandatory 5 5 11 11 16 16 100.0% Required 86 86 30 32 116 118 98.3% Advisory 28 28 10 11 38 39 97.4% * All rules that can be checked by static analysis are supported. MISRA C:2012 contains 3 rules that are not statically checkable, so a total of 170 are implemented (out of 173). MISRA C:2012 supported rules Rule Category Decidability Supported Notes Directive 1.1 Required Undecidable No This directive is not Directive 2.1 Required Undecidable Yes No checker, but a successful analysis run confirms compliance. Directive 3.1 Required Undecidable No This directive is not Directive 4.1 Required Undecidable Yes No checker, but the use of MISRA analysis will assist in minimizing runtime failures. Directive 4.2 Advisory Undecidable No This directive is not Directive 4.3 Required Undecidable Yes Directive 4.4 Advisory Undecidable Yes Directive 4.5 Advisory Undecidable Yes Directive 4.6 Advisory Undecidable Yes Adheres to Technical Corrigendum 1. Directive 4.7 Required Undecidable Yes Directive 4.8 Advisory Undecidable Yes Adheres to Technical Corrigendum 1. Directive 4.9 Advisory Undecidable Yes Directive 4.10 Directive 4.11 Directive 4.12 Required Undecidable Yes Required Undecidable Yes Adheres to Technical Corrigendum 1. Required Undecidable Yes 10

Rule Category Decidability Supported Notes Directive 4.13 Directive 4.14 Advisory Undecidable Yes Required Undecidable Yes New directive in Amendment 1. Rule 1.1 Required Decidable Yes No checker, but a successful analysis run confirms compliance. Rule 1.2 Advisory Undecidable Yes Rule 1.3 Required Undecidable Yes Rule 2.1 Required Undecidable Yes Rule 2.2 Required Undecidable Yes Adheres to Technical Corrigendum 1. Rule 2.3 Advisory Decidable Yes Rule 2.4 Advisory Decidable Yes Rule 2.5 Advisory Decidable Yes Adheres to Technical Corrigendum 1. Rule 2.6 Advisory Decidable Yes Rule 2.7 Advisory Decidable Yes Rule 3.1 Required Decidable Yes Rule 3.2 Required Decidable Yes Rule 4.1 Required Decidable Yes Rule 4.2 Advisory Decidable Yes Rule 5.1 Required Decidable Yes Rule 5.2 Required Decidable Yes Rule 5.3 Required Decidable Yes Rule 5.4 Required Decidable Yes Rule 5.5 Required Decidable Yes Rule 5.6 Required Decidable Yes Rule 5.7 Required Decidable Yes Rule 5.8 Required Decidable Yes Rule 5.9 Advisory Decidable Yes Adheres to Technical Corrigendum 1. Rule 6.1 Required Decidable Yes Rule 6.2 Required Decidable Yes Rule 7.1 Required Decidable Yes 11

Rule Category Decidability Supported Notes Rule 7.2 Required Decidable Yes Rule 7.3 Required Decidable Yes Rule 7.4 Required Decidable Yes Rule 8.1 Required Decidable Yes Rule 8.2 Required Decidable Yes Rule 8.3 Required Decidable Yes Rule 8.4 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 8.5 Required Decidable Yes Rule 8.6 Required Decidable Yes Rule 8.7 Advisory Decidable Yes Rule 8.8 Required Decidable Yes Rule 8.9 Advisory Decidable Yes Rule 8.10 Required Decidable Yes Rule 8.11 Advisory Decidable Yes Rule 8.12 Required Decidable Yes Rule 8.13 Advisory Undecidable Yes Rule 8.14 Required Decidable Yes Rule 9.1 Mandatory Undecidable Yes Rule 9.2 Required Decidable Yes Rule 9.3 Required Decidable Yes Rule 9.4 Required Decidable Yes Rule 9.5 Required Decidable Yes Rule 10.1 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 10.2 Required Decidable Yes Rule 10.3 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 10.4 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 10.5 Advisory Decidable Yes Adheres to Technical Corrigendum 1. Rule 10.6 Required Decidable Yes 12

Rule Category Decidability Supported Notes Rule 10.7 Required Decidable Yes Rule 10.8 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 11.1 Required Decidable Yes Rule 11.2 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 11.3 Required Decidable Yes Rule 11.4 Advisory Decidable Yes Adheres to Technical Corrigendum 1. Rule 11.5 Advisory Decidable Yes Rule 11.6 Required Decidable Yes Rule 11.7 Required Decidable Yes Rule 11.8 Required Decidable Yes Rule 11.9 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 12.1 Advisory Decidable Yes Rule 12.2 Required Undecidable Yes Rule 12.3 Advisory Decidable Yes Rule 12.4 Advisory Decidable Yes Adheres to Technical Corrigendum 1. Rule 12.5 Mandatory Decidable Yes New rule in Amendment 1. Rule 13.1 Required Undecidable Yes Rule 13.2 Required Undecidable Yes Adheres to Technical Corrigendum 1. Rule 13.3 Advisory Decidable Yes Rule 13.4 Advisory Decidable Yes Rule 13.5 Required Undecidable Yes Rule 13.6 Mandatory Decidable Yes Rule 14.1 Required Undecidable Yes Rule 14.2 Required Undecidable Yes Adheres to Technical Corrigendum 1. Rule 14.3 Required Undecidable Yes Rule 14.4 Required Decidable Yes Rule 15.1 Advisory Decidable Yes Rule 15.2 Required Decidable Yes 13

Rule Category Decidability Supported Notes Rule 15.3 Required Decidable Yes Rule 15.4 Advisory Decidable Yes Rule 15.5 Advisory Decidable Yes Rule 15.6 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 15.7 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 16.1 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 16.2 Required Decidable Yes Rule 16.3 Required Decidable Yes Rule 16.4 Required Decidable Yes Rule 16.5 Required Decidable Yes Rule 16.6 Required Decidable Yes Rule 16.7 Required Decidable Yes Rule 17.1 Required Decidable Yes Rule 17.2 Required Undecidable Yes Rule 17.3 Mandatory Decidable Yes Rule 17.4 Mandatory Decidable Yes Rule 17.5 Advisory Undecidable Yes Rule 17.6 Mandatory Decidable Yes Rule 17.7 Required Decidable Yes Rule 17.8 Advisory Undecidable Yes Rule 18.1 Required Undecidable Yes Rule 18.2 Required Undecidable Yes Rule 18.3 Required Undecidable Yes Rule 18.4 Advisory Decidable Yes Rule 18.5 Advisory Decidable Yes Rule 18.6 Required Undecidable Yes Rule 18.7 Required Decidable Yes Rule 18.8 Required Decidable Yes 14

Rule Category Decidability Supported Notes Rule 19.1 Mandatory Undecidable Yes Adheres to Technical Corrigendum 1. Rule 19.2 Advisory Decidable Yes Rule 20.1 Advisory Decidable Yes Rule 20.2 Required Decidable Yes Rule 20.3 Required Decidable Yes Rule 20.4 Required Decidable Yes Rule 20.5 Advisory Decidable Yes Rule 20.6 Required Decidable Yes Rule 20.7 Required Decidable Yes Rule 20.8 Required Decidable Yes Rule 20.9 Required Decidable Yes Rule 20.10 Advisory Decidable Yes Rule 20.11 Required Decidable Yes Rule 20.12 Required Decidable Yes Rule 20.13 Required Decidable Yes Rule 20.14 Required Decidable Yes Rule 21.1 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 21.2 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 21.3 Required Decidable Yes Rule 21.4 Required Decidable Yes Rule 21.5 Required Decidable Yes Rule 21.6 Required Decidable Yes Rule 21.7 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 21.8 Required Decidable Yes Changed in Amendment 1 (removed getenv ). Adheres to Technical Corrigendum 1. Rule 21.9 Required Decidable Yes Adheres to Technical Corrigendum 1. Rule 21.10 Required Decidable Yes Rule 21.11 Required Decidable Yes Rule 21.12 Advisory Decidable Yes 15

Rule Category Decidability Supported Notes Rule 21.13 Mandatory Undecidable Yes New rule in Amendment 1. Rule 21.14 Required Undecidable Yes New rule in Amendment 1. Rule 21.15 Required Decidable Yes New rule in Amendment 1. Rule 21.16 Required Decidable Yes New rule in Amendment 1. Rule 21.17 Mandatory Undecidable Yes New rule in Amendment 1. Rule 21.18 Mandatory Undecidable Yes New rule in Amendment 1. Rule 21.19 Mandatory Undecidable Yes New rule in Amendment 1. Rule 21.20 Mandatory Undecidable Yes New rule in Amendment 1. Rule 22.1 Required Undecidable Yes Rule 22.2 Mandatory Undecidable Yes Rule 22.3 Required Undecidable Yes Rule 22.4 Mandatory Undecidable Yes Rule 22.5 Mandatory Undecidable Yes Rule 22.6 Mandatory Undecidable Yes Rule 22.7 Required Undecidable Yes New rule in Amendment 1. Rule 22.8 Required Undecidable Yes New rule in Amendment 1. Rule 22.9 Required Undecidable Yes New rule in Amendment 1. Rule 22.10 Required Undecidable Yes New rule in Amendment 1. The Synopsys difference Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source components, and application behavior. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps and throughout the software development life cycle. For more information, go to www.synopsys.com/software. Synopsys, Inc. 185 Berry Street, Suite 6500 San Francisco, CA 94107 USA U.S. Sales: 800.873.8193 International Sales: +1 415.321.5237 Email: sig-info@synopsys.com 2018 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks is available at http://www.synopsys.com/copyright.html. All other names mentioned herein are trademarks or registered trademarks of their respective owners. 06/10/18.coverity-misra-standards-ds.