Writing Truly Memory Safe JIT Compilers - graalvm - Medium
How to kill off a top source of browser exploitsLast month the V8 team published an excellent blog post on what they call the V8 Sandbox. This isn’t a sandbox for your JavaScript code — it’s intended to mitigate browser exploits caused by bugs in the JIT compiler itself. That’s important work because they report that most Chrome exploits start with a V8 memory safety bug.V8 is written in C++, so it may seem like these are the sort of bugs you’d expect from working in a memory-unsafe language. Un...
Read more at medium.com