The NSA Tips: Software Memory Safety Audiolibro Por National Security Agency arte de portada

The NSA Tips: Software Memory Safety

National Security Agency April 2023

Vista previa

Obtener oferta Prueba por $0.00
La oferta termina el 30 de abril, 2025 a las 11:59PM PT.
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible?
Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra colección inigualable
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95/mes después de 3 meses. Cancela en cualquier momento.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

The NSA Tips: Software Memory Safety

De: National Security Agency
Narrado por: Tom Brooks
Obtener oferta Prueba por $0.00

$14.95/mes despues de 3 meses. La oferta termina el 30 de abril, 2025 11:59PM PT. Cancela en cualquier momento.

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $6.95

Compra ahora por $6.95

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Modern society relies heavily on software-based automation, implicitly trusting developers to write software that operates in the expected way and cannot be compromised for malicious purposes. While developers often perform rigorous testing to prepare the logic in software for surprising conditions, exploitable software vulnerabilities are still frequently based on memory issues. Examples include overflowing a memory buffer and leveraging issues with how software allocates and de-allocates memory.

Microsoft® revealed at a conference in 2019 that from 2006 to 2018 70 percent of their vulnerabilities were due to memory safety issues. [1] Google® also found a similar percentage of memory safety vulnerabilities over several years in Chrome®. [2] Malicious cyber actors can exploit these vulnerabilities for remote code execution or other adverse effects, which can often compromise a device and be the first step in large-scale network intrusions.

Commonly used languages, such as C and C++, provide a lot of freedom and flexibility in memory management while relying heavily on the programmer to perform the needed checks on memory references. Simple mistakes can lead to exploitable memory-based vulnerabilities. Software analysis tools can detect many instances of memory management issues and operating environment options can also provide some protection, but inherent protections offered by memory safe software languages can prevent or mitigate most memory management issues.

NSA recommends using a memory safe language when possible. While the use of added protections to non-memory safe languages and the use of memory safe languages do not provide absolute protection against exploitable memory issues, they do provide considerable protection. Therefore, the overarching software community across the private sector, academia, and the U.S. Government have begun initiatives to drive the culture of software development towards utilizing memory safe languages. [3] [4] [5]

©2023 Tom Brooks (P)2023 Tom Brooks
Programación Software Desarrollo de software

Lo que los oyentes dicen sobre The NSA Tips: Software Memory Safety

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.