Hacker News new | past | comments | ask | show | jobs | submit login

> This is a version of a paper published in Journal of C Language Translation, vol 2 number 2, September 1990

This says it all really. Nothing more needs to be said. Unfortunate.




I haven't read the linked paper, but both CPU speed and RAM available have increased about 100x since 1990, and nobody then had uttered the words "threat model". Some approaches that are sensible now were reasonable to overlook in 1990 for being too heavy.


Check when Morris worm came out.

And by the way,

"A consequence of this principle is that every occurrence of every subscript of every subscripted variable was on every occasion checked at run time against both the upper and the lower declared bounds of the array. Many years later we asked our customers whether they wished us to provide an option to switch off these checks in the interests of efficiency on production runs. Unanimously, they urged us not to--they already knew how frequently subscript errors occur on production runs where failure to detect them could be disastrous. I note with fear and horror that even in 1980 language designers and users have not learned this lesson. In any respectable branch of engineering, failure to observe such elementary precautions would have long been against the law."

-- C.A.R Hoare's "The 1980 ACM Turing Award Lecture"


The Morris worm affected around 2000 VAX machines a couple of years previously, and was the first ever such incident on that scale. In other words, almost nobody in 1990 had been affected by a computer security incident. It didn't make sense in 1990 to prioritise this security threat over efficiency concerns.

Insisting on memory safety back then would be like insisting on code being accompanied by checkable formal proofs of correctness now: It's a technique that can be applied right now and that does improve safety, but it comes at such a cost that the tradeoff only makes sense for a handful of niche applications (aerospace, automotive, medical devices).


Yeah, that is why we didn't had to buy anti-virus software, duh.


Viruses in 1990 propagated by people running .EXE files they copied from somewhere, or booting floppy disks they found somewhere.

Tell me how bounds checks on array accesses would have prevented that.



> 01 JUN 2004

Got anything relevant?


Yes but the same story kept repeating over the years. C89 had a good excuse. C99 was iffy with the VLA stuff instead of proper slices. What excuse did C11 have?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: