Fwd: [security-lunch] Jan 28 | Matthew Sotoudeh on "Tradeoffs in Memory Safe C/++ Compilers"

0 views
Skip to first unread message

Alan Karp

unread,
Jan 26, 2026, 12:47:43 PMJan 26
to <friam@googlegroups.com>


--------------
Alan Karp


---------- Forwarded message ---------
From: Michael Leo Paper via security-lunch <securit...@lists.stanford.edu>
Date: Mon, Jan 26, 2026 at 9:46 AM
Subject: [security-lunch] Jan 28 | Matthew Sotoudeh on "Tradeoffs in Memory Safe C/++ Compilers"
To: securit...@lists.stanford.edu <securit...@lists.stanford.edu>


Security Lunch ⛄ Ed. — Wednesday,  Jan 28th, 2026, 12:00 pm @ CoDa E160

Tradeoffs in Memory Safe C/++ Compilers
Matthew Sotoudeh
Can't make it in person? Join us on zoom.
See our past & upcoming events on our website


Abstract: 
Most modern systems depend on millions of lines of C and C++ code, languages notorious for memory safety bugs. For decades we've had compilers that completely neutralize all memory safety bugs in C programs, but performance concerns have hindered adoption. In this talk I'll summarize the state of memory safe C implementations, tell you what I've learned from reading a bunch of memory safety CVEs, and tell you about some very early work we're doing to reduce overhead. (Joint project with Zachary Yedidia.)

Bio:
Matthew is a 5th year PhD candidate advised by Dawson Engler.
_______________________________________________
security-lunch mailing list
securit...@lists.stanford.edu
https://mailman.stanford.edu/mailman/listinfo/security-lunch
Reply all
Reply to author
Forward
0 new messages