Proceedings of the 16th Workshop on Hot Topics in Operating Systems 2017
DOI: 10.1145/3102980.3103006
|View full text |Cite
|
Sign up to set email alerts
|

System Programming in Rust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(14 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…We take three measures to reduce the attack surface from GService. First, we implement GService with a safe language, specifically Rust, which is type and memory safe [7]. Second, GService uses a statically allocated, private heap.…”
Section: ) Makementioning
confidence: 99%
See 1 more Smart Citation
“…We take three measures to reduce the attack surface from GService. First, we implement GService with a safe language, specifically Rust, which is type and memory safe [7]. Second, GService uses a statically allocated, private heap.…”
Section: ) Makementioning
confidence: 99%
“…We enhance the security/safety of GService with a three-pronged approach. First, we implement most of it in Rust, a safe language that guarantees software fault isolation by preventing unauthorized memory access and using a single ownership model [7]. Second, we minimize the unsafe part of GService to a small amount of assembly code, 190 lines in our implementation, which is amenable to formal verification by existing tools, e.g., Vale [9].…”
Section: Introductionmentioning
confidence: 99%
“…High-level type-safe programming languages have the potential to eliminate many classes of programming bugs that could be exploited [3,30]. Similarly, formal verification of OS kernels provides a fundamentally safe trusted computing base (TCB) [27,39].…”
Section: Motivation: Many Os Abstractions Are Problematicmentioning
confidence: 99%
“…These virtualization techniques incur performance and energy overheads. Furthermore, popular UNIX-based server OSes are inherently vulnerable to misbehaving applications because they are written in C which is not type-safe [3].…”
Section: Introductionmentioning
confidence: 99%
“…Developers do not manually handle exported states or transfer them to other modules; they are abstracted away and managed by the compiler. At first glance, the overhead of stateless communication sounds high, but Theseus leverages affine types in Rust to realize zero-copy communication [9] even between isolated entities, along with caching and shared mappings. Singularity also exploits linear types for zero-copy transfer [22], but Theseus can resolve communication to a function call with less overhead than Singularity channels.…”
Section: State Management Without Encapsulationmentioning
confidence: 99%