Security Beyond Memory Safety
Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Using Modern C++ to Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond Memory Safety CppCon Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory Safety CppCon0 码力 | 79 页 | 4.15 MB | 5 月前3A Relaxed Guide to memory_order_relaxed
A Relaxed Guide to memory_order_relaxed Hans Boehm Paul E. McKenney Google Facebook CPPCON 2020std::atomic/std::atomic_ref and memory_order_relaxed ● C++ atomic sacrificing the simple threads-as-interleaving semantics ● by passing memory_order enum values to explicit atomic operations. ● In particular, memory_order_relaxed allows arbitrary visibility reordering with respect About memory_order_relaxed? ● Just a load, just a store: Full control, excellent efficiency and scalability! ○ Assuming aligned machine-sized atomic objects, that is…What is Not to Like About memory_order_relaxed0 码力 | 32 页 | 278.53 KB | 5 月前3Practical memory pool based allocators for Modern C++
© 2019 Apex.AI, Inc. Safe and certified software for autonomous mobility TM Practical memory pool based allocators for Modern C++ by Misha Shalem misha.shalem@apex.ai © 2020 Apex.AI, Inc.● CppCon Andreas Pasternak ● Quote: “Memory pools and allocators are only one piece of the solution” Today we going to talk about this one piece in (more) depth © 2020 Apex.AI, Inc.Memory allocations in real-time practically for C++ memory allocations? We asked an independent 3rd party safety assessor and the answer was “It should comply to Autosar C++ 14 Coding Guidelines regarding memory allocations” © 20200 码力 | 49 页 | 986.95 KB | 5 月前3Object Introspection: A Revolutionary Memory Profiler for C++ Objects
Bar std::string Bar std::string Bar std::stringObject Introspection (OI) Goals • Byte level memory footprint analysis for objects • Complete object type hierarchies • Dynamic allocations and containers hierarchy from a given root type • Understand the layout in memory of the entire hierarchy • Understand how to interpret data at memory offsets • Understand containers • Compiler generated debug Object Introspection Measurement Code Code GenerationApplied Example 1 • Unused container memory: Unused Sz = (C.capacity() - C.size()) * sizeof(element) Name TypeName Number ElemStatSz Length0 码力 | 62 页 | 2.24 MB | 5 月前3C++ Memory Model: from C++11 to C++23
Memory Model C++11 – C++23About Me: alex.dathskovsky@speedata.io www.linkedin.com/in/alexdathskovsky https://www.cppnext.comAlex Dathskovsky | alex.dathskovsky@speedata.io | www.linkedin.com/in/a hazards • an instruction can be executed when its operands have been calculated or loaded from memory • an instruction stalls if operands are not availableAlex Dathskovsky | alex.dathskovsky@speedata com/in/alexdathskovsky Reordering Types • Data dependencies must be honored • C++ compiler may reorder any memory access under the as-if rule • Different processors have different reordering guarantiesAlex0 码力 | 112 页 | 5.17 MB | 5 月前3Just-in-Time Compilation - J F Bastien - CppCon 2020
In this talk I'll tell you about C++ AoT compiler, JiTs for dynamic language, JiTs for binary translation, and dive back 20, 30, 40, 50, 60 years, way back into compiler history and read wonderful academic liberty, folks usually think of JIT as: The executable code changes after the program is loaded into memory and the linker/loader are done doing their work. On modern systems: pages mapped X at some point “just-in-time” compilation (JiT) techniques since the 1960s. Broadly, JiT compilation includes any translation performed dynamically, after a program has started execution. We examine the motivation behind0 码力 | 111 页 | 3.98 MB | 5 月前3Spanny 2: Rise of std::mdspan
hilbert, matching types ● roboticists and their lack of beer ● external state memory accessor ● improving memory access using asynchronicity 4 ● motivations for std::mdspan ● review std::mdspan hilbert, matching types ● roboticists and their lack of beer ● external state memory accessor ● improving memory access using asynchronicity 5 ● motivations for std::mdspan ● review std::mdspan hilbert, matching types ● roboticists and their lack of beer ● external state memory accessor ● improving memory access using asynchronicity 6 ● motivations for std::mdspan ● review std::mdspan0 码力 | 117 页 | 2.02 MB | 5 月前3Oracle VM VirtualBox 5.2.40 User Manual
. . . . . . . . . . . . . . . . 80 3 Contents 4.9 Memory overcommitment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 4.9.1 Memory ballooning . . . . . . . . . . . . . . . . . . . . to networking modes . . . . . . . . . . . . . . . . . . . . . . . . . . 97 6.3 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . 98 6.3.1 Configuring port forwarding with limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 6.4 Network Address Translation Service . . . . . . . . . . . . . . . . . . . . . . . . 100 6.5 Bridged networking . . . . . .0 码力 | 387 页 | 4.27 MB | 6 月前3Oracle VM VirtualBox 5.2.12 User Manual
. . . . . . . . . . . . . . . . . . . 80 4.9 Memory overcommitment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 3 Contents 4.9.1 Memory ballooning . . . . . . . . . . . . . . . . . to networking modes . . . . . . . . . . . . . . . . . . . . . . . . . . 97 6.3 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . 98 6.3.1 Configuring port forwarding with limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 6.4 Network Address Translation Service . . . . . . . . . . . . . . . . . . . . . . . . 100 6.5 Bridged networking . . . . . .0 码力 | 380 页 | 4.23 MB | 6 月前3Oracle VM VirtualBox 4.3.36 User Manual
. . . . . . . . . . . . . . . . . . . . . . 77 4.8 Memory overcommitment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 4.8.1 Memory ballooning . . . . . . . . . . . . . . . . . . . . to networking modes . . . . . . . . . . . . . . . . . . . . . . . . . . 93 6.3 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . 94 6.3.1 Configuring port forwarding with limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 6.4 Network Address Translation Service (experimental) . . . . . . . . . . . . . . . 96 6.5 Bridged networking . . . . . . . .0 码力 | 380 页 | 3.79 MB | 6 月前3
共 244 条
- 1
- 2
- 3
- 4
- 5
- 6
- 25