Wrangling Untrusted File Formats Safely
-
Updated
May 27, 2024 - C
Wrangling Untrusted File Formats Safely
Migrate C code to Rust
A Fast and Safe Python based on PyPy
MesaLock Linux: a memory-safe Linux distribution.
Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs in Rust.
Lean C/C++ Bounds Checking with Low-Fat Pointers
R3-OS — Experimental static (μITRON-esque) RTOS for deeply embedded systems, testing the limit of Rust's compile-time evaluation and generics
Runtime type and bounds-error checking for C/C++
A binary hardening system
Configurable instrumentation of LLVM bitcode
Lists of must-read papers (mainly security papers)
An enigmatic programming language.
In-memory security with secure data types
Fully Randomized Pointers
Provides cell types that decouple permissions from data.
A hardened malloc() replacement
C Compiler that strives to be as (memory) safe as possible.
Identification and Analysis of unsafe.Pointer Usage Patterns in Open-Source Go Code
instrumentor is a tool for instrumenting LLVM IR to detect problems at runtime. The initial focus is on memory safety issues such as leaks, use-after-free, stack smashing, and out-of-bounds access.
Add a description, image, and links to the memory-safety topic page so that developers can more easily learn about it.
To associate your repository with the memory-safety topic, visit your repo's landing page and select "manage topics."