Click any tag below to further narrow down your results
Links
The article discusses the rapid growth of C++ and Rust from 2022 to 2025, attributing it to the increasing demand for efficient programming languages driven by limitations in hardware capabilities and power supply. It also addresses misconceptions about C++'s safety and security, highlighting improvements in the upcoming C++26 standard.
This article revisits the Clang Hardening Cheat Sheet from ten years ago, highlighting new security mitigations in the Clang toolchain. It covers essential flags and options to enhance application security against modern threats, including stack-based memory corruption and dynamic loading vulnerabilities.
Metis is an open-source tool developed by Arm to enhance security code reviews using AI. It leverages large language models for semantic understanding, making it effective in identifying vulnerabilities in complex codebases. The tool is extensible and supports multiple programming languages.
This article explores the current state of WebAssembly, examining its real-world applications and the misconceptions around its adoption. It highlights WebAssembly's role as a compilation target, its security benefits, and its potential for enhancing portability and performance across various platforms.
The author expresses a deep appreciation for the C programming language due to its efficiency and the intimate connection it fosters with the computer. However, they highlight the dangers of C, particularly in the context of a web framework they reviewed, which exhibited significant memory safety issues due to improper handling of Content-Length values, potentially leading to vulnerabilities.
Effective programming in C requires a shift from validation to parsing, emphasizing the creation of opaque types to manage untrusted input safely. By parsing data at the system boundary and ensuring strong type safety, programmers can significantly reduce the risk of exploitable errors and enhance code maintainability. This approach not only encapsulates raw strings but also prevents parameter mixing through compiler enforcement.
The repository chronicles the author's development of a stealthy in-memory loader aimed at understanding malware evasion techniques and enhancing skills in offensive security and low-level programming. The project consists of multiple sub-projects, focusing on tasks such as memory allocation, downloading payloads to memory, and executing machine code directly from memory, with future plans to incorporate encryption and advanced evasion techniques. It serves as an educational resource for penetration testers and security researchers, emphasizing ethical usage.
Package managers are criticized for creating dependency hell, where projects become overwhelmed with numerous dependencies that aren't properly vetted, leading to significant maintenance challenges and security risks. The author argues for manual dependency management as a better alternative, emphasizing the importance of understanding and controlling the packages used in programming projects.
The article discusses the potential risks associated with a single line of code that can cause significant issues, such as bricking an iPhone. It emphasizes the importance of understanding code execution and the consequences of seemingly harmless commands. The content serves as a warning to developers about the impact of their coding practices.
A web-based Capture The Flag (CTF) platform offers extensive source code auditing challenges, allowing users to analyze real-world C/C++ vulnerabilities while mastering secure coding practices. Currently in ALPHA, the platform encourages user feedback and participation to refine its features and improve overall stability. It includes a vast collection of challenges, user profiles, and educational resources, all built with modern web technologies.