Back

Fil-C Introduces InvisiCaps for Memory Safety in C/C++

Severity: Low (Score: 21.9)

Sources: News.Ycombinator, www.ralfj.de, fil-c.org, clang.llvm.org

Summary

Fil-C has launched InvisiCaps, a capability model aimed at ensuring memory safety for C and C++ programming. This model dynamically tracks pointer access to prevent out-of-bounds errors, access to freed objects, and corruption of pointer capabilities. The implementation is designed to maintain compatibility with existing C idioms while enhancing safety. Previous models like PLUT and SideCaps were abandoned due to performance issues and lack of support for certain data structures. InvisiCaps aims to provide a balance between safety, performance, and compatibility. The introduction of a garbage collector (GC) is also part of the model, which automatically manages memory, reducing the risk of leaks. This development is part of ongoing research in the field of memory safety for low-level programming languages. Key Points: • InvisiCaps is a new capability model for memory safety in C/C++. • The model prevents common memory errors like out-of-bounds access and use-after-free. • A garbage collector is integrated to manage memory automatically.

Key Entities

  • Cwe-125 - Out-of-bounds Read (cwe)
  • Cwe-416 - Use After Free (cwe)
  • Cwe-787 - Out-of-bounds Write (cwe)
  • T1003 - OS Credential Dumping (mitre_attack)
  • T1021 - Remote Services (mitre_attack)
  • T1041 - Exfiltration Over C2 Channel (mitre_attack)
  • T1047 - Windows Management Instrumentation (mitre_attack)
  • T1053 - Scheduled Task/Job (mitre_attack)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed