Hello,
Microsoft to explore using Rust
Rust has been gaining in popularity and Microsoft intends to see if it
can hold up to its demands.
70% OF ALL MICROSOFT PATCHES ARE FOR MEMORY-RELATED BUGS
The reason for this high percentage is because Windows and most other
Microsoft products have been written mostly in C and C++, two
"memory-unsafe" programming languages that allow developers fine-grained
control of the memory addresses and where code can be executed.
Microsoft plans to explore using the Rust programming language as an
alternative to C, C++, and others, as a way to improve the security
posture of its and everyone else's apps.
The announcement was made yesterday by Gavin Thomas, Principal Security
Engineering Manager for the Microsoft Security Response Center (MSRC).
"You're probably used to thinking about the Microsoft Security Response
Center as a group that responds to incidents and vulnerabilities,"
Thomas said. "We are a response organization, but we also have a
proactive role, and in a new blog series we will highlight Microsoft's
exploration of safer system programming languages, starting with Rust."
The end game is to find a way to move developers from the aging C and
C++ programming language to so-called "memory-safe languages."
Memory-safe languages, such as Rust, are designed from the ground up
with protections against memory corruption vulnerabilities, such as
buffer overflows, race conditions, memory leaks, use-after free and
memory pointer-related bugs.
C#, a programming language developed by Microsoft, also features some
memory access improvements but is not as advanced as Rust.
Read more here:
https://www.zdnet.com/article/microsoft-to-explore-using-rust/
Thank you,
Amine Moulay Ramdane.