Member-only story
Improving Software Reliability and Security through Memory-Safe Languages
Memory safety issues refer to vulnerabilities that arise from incorrect or unexpected behavior when dealing with dynamic memory management in software. These include problems like buffer overflows, use-after-free bugs, and other memory corruption issues.
What happen when language is not memory safe?
Languages that are not memory safe tend to allow for more bugs and crashes, application stability can be greatly impacted application stability. Moreover, these bugs can be incredibly difficult for developers to track down.
Generally speaking Memory safe languages are more secure than languages that are not memory safe. Memory safe languages include Rust, Go, C#, Java, Swift, Python, and JavaScript. Languages that are not memory safe include C, C++, and assembly.
What Are Memory Safety Bugs?
Out of Bounds Reads and Writes, Access to a deleted memory address…etc. Memory corruption can often cause crashes to occur very easily without good practices, testing and training.
Software engineering can be an art as well as a science, and most software is not uniform; some behavior may be very unpredictable. Today’s software development is fast-moving — the process of agility speed up designing, building, testing, and approval for deployment of a product release can happen in less than a day.