The Great Apple bet to get rid of the most targeted weaknesses at iPhone
I launched Apple A. Slate of New iPhone on Tuesday is loaded with the new A19 and A19 Pro chip for the company. Along with the iPhone Air Ultrathin and other redesign, the new phones come with a lower sparkling upgrade that can turn into the real killer feature. A safety improvement is called the implementation of memory safety between the protection that always works at the level of chips and the software motivation in an attempt to harden iPhone against the most common-common-and-exploitation.
In recent years, a movement has been steadily growing throughout the global technology industry to address the type of errors everywhere and with a treacherous known as the weaknesses of memory safety. Computer memory is a common supplier between all programs, and memory safety problems are formed when programs can withdraw data that should be outside the limits of computer memory or data processing in memory that should not be accessed for the program. When developers-even developers with experience and employees-make books programs in historical programming languages everywhere, such as C and C ++, it is easy to make errors that lead to weaknesses on memory safety. This is why pre -emptive tools such as special programming languages have spread with the aim of making it structurally impossible to contain these weak points, rather than trying to avoid or capture them all.
“The importance of memory safety,” the US National Security Agency, Cyber Security, and the infrastructure security agency Written in the June report. “The consequences of weaknesses on the safety of the memory can be severe, from data violations to system accidents and operational disorders.”
Apple fast programming language, which was released in 2014, is safe for memory. The company says it is writing a new code in Swift for years as well as trying to repair the current code and rewrite the current code in a safe language to make its systems safer. This challenge of memory safety reflects all over the industry, because even if a new code is written safely, the world program has all written in non -memory languages for decades. While the ecosystem that was secured in Apple so far has succeeded in preventing widespread harmful program attacks against iPhone, the enthusiastic attackers, especially spyware makers, are still developing complex chains to exploit iOS at a high cost to target iPhones of the specified victims.
Even with the work that Apple has done to start repairing its symbol for memory safety, the company has found that these rare attack chains still always include exploiting memory errors.
“The well -known mercenary spyware chains of iOS shares a common denominator with those targeting Windows and Android: It takes advantage of weaknesses on memory safety, which can be switched, strong, and destroyed throughout the industry,” she wrote Apple in it Announcement to enforce memory safety Wednesday.
Apple has increasingly invested in memory safety through fast and safe memory allocations who run “custom” and “known” memory areas for data – a major factor in, and the source of safety points in memory. But the enforcement of the integrity of the memory itself was originally inspired by the work level to protect the safety of the code even when the system suffers from memory corruption.