Memory Safety

Securing tomorrow's software: the need for memory safety standards

Memory safety vulnerabilities have been a persistent security challenge costing billions, prompting a call for industry-wide standardization and secure-by-design practices. Recent advancements in memory-safe languages like Rust and hardware technologies offer promising solutions for widespread adoption. Google advocates for establishing a common framework to assess memory safety assurances and drive industry-wide adoption of secure practices.

Re: Rust kernel policy

Greg KH, a Linux kernel maintainer, strongly advocates for incorporating Rust into the kernel, citing how it eliminates common C-related bugs and memory safety issues. He emphasizes that Rust would particularly benefit new code and drivers, while acknowledging the ongoing importance of improving the existing C codebase. The discussion addresses concerns about mixed-language maintenance and developer adaptation.

It Is Time to Standardize Principles and Practices for Software Memory Safety

Memory-safety vulnerabilities have constituted approximately two-thirds of critical security vulnerabilities in major software systems for over two decades, enabling widespread malware and targeted attacks. Strong memory-safety technologies have matured sufficiently for deployment, but lack standardized terminology and frameworks for implementation and procurement. Market failure and misaligned incentives have hindered adoption of memory-safe solutions, despite their potential to prevent catastrophic security breaches.

Pointers Are Complicated II, or: We need better language specs

The article explores how pointer provenance affects compiler optimizations, demonstrating how three seemingly correct LLVM transformations can lead to incorrect results when combined. The author argues for treating compiler IRs as proper programming languages with precise specifications to prevent optimization conflicts, particularly regarding pointer-integer casts and provenance tracking.