Changeset 7ca6bf1 for doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex
- Timestamp:
- Aug 20, 2025, 12:12:31 PM (7 months ago)
- Branches:
- master, stuck-waitfor-destruct
- Children:
- 1dec8f3
- Parents:
- 9989781 (diff), 7ea4073 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the(diff)links above to see all the changes relative to each parent. - File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex
r9989781 r7ca6bf1 132 132 Often array is part of the programming language, while linked-list is built from (recursive) pointer types, and string from a combination of array and linked-list. 133 133 For all three types, languages and/or their libraries supply varying degrees of high-level mechanisms for manipulating these objects at the bulk and component level, such as copying, slicing, extracting, and iterating among elements. 134 Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%- 80\% of hacker attack-vectors target these types.134 Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%--80\% of hacker attack-vectors target these types. 135 135 Therefore, hardening these three C types goes a long way to make the majority of C programs safer. 136 136
Note:
See TracChangeset
for help on using the changeset viewer.