{"id":46865,"date":"2022-05-27T11:22:13","date_gmt":"2022-05-27T11:22:13","guid":{"rendered":"http:\/\/f800abf3-4c75-4eb3-98b2-25e964c1f1be"},"modified":"2022-05-27T11:22:13","modified_gmt":"2022-05-27T11:22:13","slug":"programming-languages-how-google-is-improving-c-memory-safety","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/","title":{"rendered":"Programming languages: How Google is improving C++ memory safety"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google&#8217;s Chrome team is looking at heap scanning to reduce memory-related security flaws in Chrome&#8217;s C++ codebase, but the technique creates a toll on memory \u2014 except when newer Arm hardware is used. &nbsp;&nbsp;<\/p>\n<p>Google can&#8217;t just rip and replace Chromium&#8217;s existing C++ code with memory safer Rust, but it is working on ways to improve the memory safety of C++ by scanning heap allocated memory. The catch is that it&#8217;s expensive on memory and for now only experimental.<\/p>\n<p>Google and Microsoft are major <a href=\"https:\/\/www.zdnet.com\/article\/developers-programming-language-c-is-about-to-get-this-huge-update\/\" rel=\"follow\">users of and contributors to the fast programming language C++<\/a>, which is used in projects like&nbsp; Chromium, Windows, the Linux kernel, and Android. There is growing interest in using Rust because of its memory safety guarantees. &nbsp;<\/p>\n<p>But switching wholesale from C++ in Chrome to a language like Rust simply can&#8217;t happen in the near term.&nbsp;<\/p>\n<p>&#8220;While there is appetite for different languages than C++ with stronger memory safety guarantees, large codebases such as Chromium will use C++ for the foreseeable future,&#8221; <a href=\"https:\/\/security.googleblog.com\/2022\/05\/retrofitting-temporal-memory-safety-on-c.html\" target=\"_blank\" rel=\"noopener\">explain Anton Bikineev, Michael Lippautz and Hannes Payer of Chrome&#8217;s security team<\/a>.&nbsp; &nbsp;<\/p>\n<p>Given this status, Chrome engineers have found ways to make C++ safer to reduce memory-related security flaws such as buffer overflow and use-after free (UAF), which account for 70% of all software security flaws.&nbsp;<\/p>\n<p>C++ doesn&#8217;t guarantee that memory is always accessed with the latest information of its structure. So, Google&#8217;s Chrome team have been exploring the use of a &#8220;memory quarantine&#8221; and heap scanning to stop the reuse of memory that is still reachable.&nbsp;<\/p>\n<p>UAFs make up the majority of high-severity issues affecting the browser. A case in point is this week&#8217;s Chrome 102, which <a href=\"https:\/\/www.zdnet.com\/article\/time-to-update-google-chrome-102-arrives-with-32-security-fixes-one-critical\/\" rel=\"follow\">fixed one critical UAF<\/a>, while <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/05\/stable-channel-update-for-desktop_24.html\" target=\"_blank\" rel=\"noopener\">six of eight high-severity flaws<\/a> were UAFs.<\/p>\n<p>UAF access in heap allocated memory is caused by &#8220;dangling pointers&#8221;, which occurs when memory used by an application is returned to the underlying system but the pointer points to an out-of-date object. Access through the dangling pointer results in a UAF, which are hard to spot in large code bases.<\/p>\n<p>To detect UAFs, Google already <a href=\"https:\/\/www.zdnet.com\/article\/chrome-willing-to-take-performance-hit-to-prevent-use-after-free-bugs\/\" rel=\"follow\">uses C++ smart pointers like MiraclePtr<\/a>, which also caused a performance hit, as well as static analysis in compilers, C++ sanitizers, code fuzzers, and a garbage collector called Oilpan. The appeal of Rust is that its compiler spots pointer mistakes before the code runs on a device, thus avoiding performance penalties.&nbsp;<\/p>\n<p>Heap scanning may add to this arsenal if it makes it beyond experimental phase, but adoption will depend on devices using the latest Arm hardware.&nbsp;<\/p>\n<p>Google explains how quarantines and heap scanning works: &#8220;The main idea behind assuring temporal safety with quarantining and heap scanning is to avoid reusing memory until it has been proven that there are no more (dangling) pointers referring to it. To avoid changing C++ user code or its semantics, the memory allocator providing new and delete is intercepted.&nbsp;<\/p>\n<p>Upon invoking delete, the memory is actually put in a quarantine, where it is unavailable for being reused for subsequent new calls by the application, Google said. &nbsp;&#8220;At some point a heap scan is triggered which scans the whole heap, much like a garbage collector, to find references to quarantined memory blocks. Blocks that have no incoming references from the regular application memory are transferred back to the allocator where they can be reused for subsequent allocations.&#8221;<\/p>\n<p>Google&#8217;s heap scanning consists of a set of algorithms it calls StarScan (*Scan). But one version of *Scan caused a memory regressions of 8% in Speedometer2 browser performance benchmark tests. *Scan in the render process regressed memory consumption by about 12%, Google notes.&nbsp;<\/p>\n<p>Google then tried hardware-assisted memory tagging via the relatively memory tagging extension (MTE) in ARM v8.5A to reduce performance overheads.&nbsp;<\/p>\n<p>The *Scan with MTE benchmark results were promising. After re-doing the *Scan experiments on top of MTE in the renderer process, memory regression was about 2% in Speedometer2.&nbsp;<\/p>\n<p>&#8220;The experiment also shows that adding *Scan on top of MTE comes without measurable cost,&#8221; they wrote.&nbsp;<\/p>\n<p>But for now, heap scanning in a way that doesn&#8217;t create an unacceptable performance hit remains a thing for the future, when MTE is more widely adopted.&nbsp;<\/p>\n<p>&#8220;C++ allows for writing high-performance applications but this comes at a price, security. Hardware memory tagging may fix some security pitfalls of C++, while still allowing high performance,&#8221; Chrome security team&#8217;s conclude. &nbsp;<\/p>\n<p>&#8220;We are looking forward to see a more broad adoption of hardware memory tagging in the future and suggest using *Scan on top of hardware memory tagging to fix temporary memory safety for C++. Both the used MTE hardware and the implementation of *Scan are prototypes and we expect that there is still room for performance optimizations.&#8221;&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/programming-languages-how-google-is-improving-c-memory-safety\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google&#8217;s Chrome is looking to bring memory safety to Chrome&#8217;s C++ codebase.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46865","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-27T11:22:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Programming languages: How Google is improving C++ memory safety\",\"datePublished\":\"2022-05-27T11:22:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/\"},\"wordCount\":815,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\\\/2022\\\/02\\\/02\\\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\\\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/\",\"name\":\"Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\\\/2022\\\/02\\\/02\\\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\\\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"datePublished\":\"2022-05-27T11:22:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\\\/2022\\\/02\\\/02\\\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\\\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\\\/2022\\\/02\\\/02\\\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\\\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/programming-languages-how-google-is-improving-c-memory-safety\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programming languages: How Google is improving C++ memory safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/","og_locale":"en_US","og_type":"article","og_title":"Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-27T11:22:13+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Programming languages: How Google is improving C++ memory safety","datePublished":"2022-05-27T11:22:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/"},"wordCount":815,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/","url":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/","name":"Programming languages: How Google is improving C++ memory safety 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","datePublished":"2022-05-27T11:22:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/efd37435f2d5dccfa0b04cc0d3c442b820fb4b3d\/2022\/02\/02\/b2794aeb-919a-4e9a-b77b-e33a62c2c7f0\/zd-coding-ebook.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/programming-languages-how-google-is-improving-c-memory-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Programming languages: How Google is improving C++ memory safety"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46865"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46865\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}