Hardened Modern C++: Engineering Memory Safety and Exploit Mitigation for Mission-Critical Systems. (High-Performance C++ Engineering) - Softcover

Buch 6 von 11: High-Performance C++ Engineering

S. Lightner, Billie

 
9798195348274: Hardened Modern C++: Engineering Memory Safety and Exploit Mitigation for Mission-Critical Systems. (High-Performance C++ Engineering)

Inhaltsangabe

Secure Your Mission-Critical C++ Codebase for the Modern Threat Landscape.

The tech industry is facing a memory safety crisis. Legacy C and outdated C++ paradigms are the root cause of 70% of modern vulnerabilities, leading to intense pressure to rewrite entire systems. But for High-Frequency Trading (HFT), aerospace, and enterprise infrastructure, starting over isn't an option. Hardened Modern C++ is the definitive engineering manual for achieving provable memory safety and exploit mitigation without sacrificing zero-cost abstractions.

Bridging the gap between legacy systems and the C++26 horizon, this book teaches you how to systematically eliminate buffer overflows, use-after-free bugs, and data races. You will learn to weaponize modern C++ features from std::span and concepts to compile-time sanitization to make invalid application states mathematically unrepresentable.
Inside, you will discover:

  • Spatial & Temporal Safety: Eliminate raw pointers and bounding errors using std::span, std::mdspan, and deterministic RAII object lifecycles.
  • Compile-Time Hardening (Shift Left): Move vulnerability checks entirely to compile-time using the consteval revolution and C++20 Concepts.
  • Concurrency Security: Eradicate data races and TOCTOU vulnerabilities by mastering the C++20 memory model, Hazard Pointers, and lock-free queues.
  • Hardware-Assisted Mitigation: Bridge C++ and silicon to defeat ROP/JOP chains with Intel CET and catch illegal accesses with ARM Memory Tagging Extensions (MTE).
  • Defending the Perimeter: Build zero-allocation parsers with std::string_view to prevent injection attacks and DoS memory exhaustion.
  • "Day 2" Brownfield Survival: Actionable blueprints for applying the Strangler Fig pattern to legacy C-strings, void* casts, and vulnerable FFI boundaries.
THE IMPLEMENTATION VAULT (Appendix)

Engineered for the security architect in the trenches, the Appendix provides immediate, battle-tested utility:
  • The 15-Point Security Code Review Checklist: Your mandatory audit before any production merge.
  • Exploit Mitigation vs. Overhead Table: The definitive cheat sheet for balancing security layers against CPU latency.
  • Troubleshooting Sanitizers: Direct solutions for the top 10 most common AddressSanitizer (ASan) and ThreadSanitizer triggers.
Defend your architecture. Meet stringent security compliance mandates. Prove that modern C++ can be as safe as it is fast.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.