Memory should be safer.

The White House recently urged organizations to develop roadmaps for implementing memory safety in software applications, aiming to eliminate up to 70% of vulnerabilities caused by memory-related defects, as highlighted by researchers at Microsoft and Google. While memory-safe programming languages like Rust and Swift offer a promising solution, transitioning existing applications from C/C++ will be a lengthy process. To address this challenge, mitigation strategies include software-based solutions such as LLVM’s Control Flow Integrity (CFI), which helps protect against specific attacks, and emerging hardware-based approaches like Intel’s Control-flow Enforcement Technology (CET), ARM’s Memory Tagging Extension (MTE), and CHERI (Capability Hardware Enhanced RISC Instructions), which can accelerate progress toward memory safety.