Wrangling Untrusted File Formats Safely
-
Updated
Nov 7, 2024 - C
Wrangling Untrusted File Formats Safely
Migrate C code to Rust
Checked C is an extension to C that lets programmers write C code with bounds checking and improved type-safety. The goal is to let people easily make their existing C code type-safe and eliminate entire classes of errors.
🚀Memory safe, blazing fast, configurable, minimal hello world written in rust(🚀) in a few lines of code with few(1092🚀) dependencies🚀
This repo contains a version of clang that is being modified to support Checked C. Checked C is an extension to C that lets programmers write C code that is guaranteed by the compiler to be type-safe.
A Fast and Safe Python based on PyPy
MesaLock Linux: a memory-safe Linux distribution.
Safe, fast, zero-panic, zero-crashing, zero-allocation parsing of untrusted inputs in Rust.
Lean C/C++ Bounds Checking with Low-Fat Pointers
R3-OS — Experimental static (μITRON-esque) RTOS kernel for deeply embedded systems, testing the limit of Rust's compile-time evaluation and generics
Runtime type and bounds-error checking for C/C++
A binary hardening system
This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory protection and scalable compartmentalization.
Gliimly is a new programming language and framework for writing high-performance web services and web applications, with focus on simplicity.
Configurable instrumentation of LLVM bitcode
Lists of must-read papers (mainly security papers)
An open-source general-purpose programming language using the LLVM project.
An enigmatic JIT programming language
In-memory security with secure data types
Add a description, image, and links to the memory-safety topic page so that developers can more easily learn about it.
To associate your repository with the memory-safety topic, visit your repo's landing page and select "manage topics."