![]() “For instance, an out-of-bounds read can result in reading from adjacent blocks in memory that may contain sensitive data,” Raad says. These bugs could lead to accessing private data, corrupting data, or even executing code that isn’t part of a program. In an app that manages a list of to-do items, for example, an out-of-bounds read could involve accessing the nonexistent sixth item in a list of five, while a use-after-free bug could involve accessing one of the items on an already deleted to-do list. Memory safety is a feature of programming languages that prevents certain types of memory-access bugs, such as out-of-bounds reads and writes, and use-after-free bugs. “One of the key reasons why memory-safe languages are gaining popularity now is the prevalence of security issues, one of the main causes of which are memory-safety vulnerabilities,” says Azalea Raad, a senior lecturer in the Department of Computing at Imperial College London. Earlier this year, Consumer Reports encouraged the use of memory-safe languages in its “Future of Memory Safety” report. ![]() In November 2022, the National Security Agency recommended the use of memory-safe programming languages to protect against software-memory safety issues.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |