www.infoworld.com Open in urlscan Pro
151.101.66.165  Public Scan

URL: https://www.infoworld.com/article/3713203/white-house-urges-developers-to-dump-c-and-c.html
Submission: On February 29 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


infoworld
UNITED STATES
 * United States
 * United Kingdom

 * App Dev
 * Cloud
 * Gen AI
 * Machine Learning
 * Analytics
 * Newsletters
 * White Papers/Webcasts

×

search
 

Analytics
Careers
Databases
Cloud Computing
 * Amazon Web Services
 * Kubernetes
 * Microsoft Azure

Generative AI
Machine Learning
Open Source
Software Development
 * Agile Development
 * CI/CD
 * Devops
 * Java
 * JavaScript
 * Microsoft .Net

Enterprise Buyer’s Guides
Newsletters
IDG Events
In-Depth
 * Features
 * How-To
 * News
 * Reviews

Blogs
Video
 * Do More with R
 * Smart Python
 * IDG TECH(talk) Channel

White Papers/Webcasts
From Our Partners
   
   
 * The Latest Content from Our Sponsors

More from the Foundry Network
The voice of IT leadership
Analytics Careers CIO Role Digital Transformation Leadership Project Management
Security at the speed of business
Application Security Cloud Security Identity Management Information Security
Network Security Risk Management Security Software
Making technology work for business
Blockchain Collaboration Mobile Office Software Security Systems Management
Windows
From the data center to the edge
Data Center Internet of Things Linux Networking SD-WAN Servers Storage Wi-Fi
 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * Copyright Notice |
 * Terms of Service |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Home
 * Software Development
 * Programming Languages




WHITE HOUSE URGES DEVELOPERS TO DUMP C AND C++


BIDEN ADMINISTRATION CALLS FOR DEVELOPERS TO EMBRACE MEMORY-SAFE PROGRAMING
LANGUAGES AND MOVE AWAY FROM THOSE THAT CAUSE BUFFER OVERFLOWS AND OTHER MEMORY
ACCESS VULNERABILITIES.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Grant Gross

InfoWorld | Feb 27, 2024 10:35 am PST


Magdalena Petrova



US President Joe Biden’s administration wants software developers to use
memory-safe programming languages and ditch vulnerable ones like C and C++.

The White House Office of the National Cyber Director (ONCD), in a report
released Monday, called on developers to reduce the risk of cyberattacks by
using programming languages that don’t have memory safety vulnerabilities.
Technology companies “can prevent entire classes of vulnerabilities from
entering the digital ecosystem” by adopting memory-safe programming languages,
the White House said in a news release.

Memory-safe programming languages are protected from software bugs and
vulnerabilities related to memory access, including buffer overflows,
out-of-bounds reads, and memory leaks. Recent studies from Microsoft and Google
have found that about 70 percent of all security vulnerabilities are caused by
memory safety issues.

“We, as a nation, have the ability—and the responsibility—to reduce the attack
surface in cyberspace and prevent entire classes of security bugs from entering
the digital ecosystem but that means we need to tackle the hard problem of
moving to memory safe programming languages,” National Cyber Director Harry
Coker said in the White House news release.



The US Cybersecurity and Infrastructure Security Agency also urged developers to
use memory-safe programming languages in a September blog post. CISA, the FBI,
the US National Security Agency, and agencies from allied countries also
published the report, “The Case for Memory Safe Roadmaps,” in December.

The new 19-page report from ONCD gave C and C++ as two examples of programming
languages with memory safety vulnerabilities, and it named Rust as an example of
a programming language it considers safe. In addition, an NSA cybersecurity
information sheet from November 2022 listed C#, Go, Java, Ruby, and Swift, in
addition to Rust, as programming languages it considers to be memory-safe.



About 22 percent of all software programmers used C++, and 19 percent used C as
of 2023, according to Statista, making them less popular than JavaScript,
Python, Java and a few others. But the TIOBE Programming Community index ranks
only Python as more popular, followed by C, C++, and Java.


SHIFTING RESPONSIBILITY

One goal of the new report is to shift the responsibility of cybersecurity away
from individuals and small businesses and onto large organizations, technology
companies, and the US government, which are “more capable of managing the
ever-evolving threat,” the White House news release said.



ONCD worked with the private sector, including technology companies, the
academic community, and other organizations to develop the recommendations in
the report, it said. ONCD issued a request for public input on the topic in
August. It also gathered comments in support of the initiative from several
technology companies, including Hewlett Packard Enterprise, Accenture, and
Palantir. Other software security experts also praised the report.

The ONCD report is helpful and timely, said Dan Grossman, a computer science
professor at the University of Washington. While “dangers of C and C++ have been
well-known for decades,” this is a good time for the White House to push for
memory safety because practical and mature alternatives are now available, he
said.


TIME TO CHANGE

At the same time, changes are needed because of “the sophistication of threats
from adversaries that exploit memory safety violations,” he said.

Discussions about memory safety involving the government, industry, and academic
can lead to meaningful change, he added. “Naturally, many branches of the
federal government are key creators and vendors for software and they can use
this perspective in deciding their priority for upcoming changes to systems or
new systems.”



However, a move away from C and C++ won’t happen overnight, especially in
embedded systems, Grossman said. “But the use of other languages for systems
software, notably Rust, has already grown significantly, and I think many people
anticipate that sort of evolution accelerating rather than C and C++ development
simply stopping, which still seems unimaginable in its entirety.”

Moving away from C and C++ will be a “long and difficult process,” added Josh
Aas, executive director and co-founder of the Internet Security Research
Group. “It takes a sustained effort to change the way people think about things,
and communications like this help keep the issue of safety fresh in peoples’
minds.”

For the change to happen, the government and the private sector need to work
together to make secure code a priority, Aas said.

“Ultimately, we need to write and deploy new code, but in order to get there, we
need resources and we need leaders at all levels, from government to the private
sector, to make it a priority,” he added. “Relevant leaders need to be made
aware of the problem, and they need to know that they are going to be supported
if they make solving this problem a priority.”



Next read this:

 * Why companies are leaving the cloud
 * 5 easy ways to run an LLM locally
 * Coding with AI: Tips and best practices from developers
 * Meet Zig: The modern alternative to C
 * What is generative AI? Artificial intelligence that creates
 * The best open source software of 2023

Related:
 * Programming Languages
 * C Language
 * Application Security

Copyright © 2024 IDG Communications, Inc.




SPONSORED LINKS

 * Want to justify your IT investments faster? IDC reports on how to measure
   business impact.
 * Read this IDC spotlight to learn what commonly prevents value realization –
   and how to solve it

InfoWorld Follow us
 * 
 * 
 * 
   


 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * Copyright Notice
 * Terms of Service
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2024 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World