Loading…

RustBelt: securing the foundations of the Rust programming language

Rust is a new systems programming language that promises to overcome the seemingly fundamental tradeoff between high-level safety guarantees and low-level control over resource management. Unfortunately, none of Rust's safety claims have been formally proven, and there is good reason to questio...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings of ACM on programming languages 2018-01, Vol.2 (POPL), p.1-34
Main Authors: Jung, Ralf, Jourdan, Jacques-Henri, Krebbers, Robbert, Dreyer, Derek
Format: Article
Language:English
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13
cites cdi_FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13
container_end_page 34
container_issue POPL
container_start_page 1
container_title Proceedings of ACM on programming languages
container_volume 2
creator Jung, Ralf
Jourdan, Jacques-Henri
Krebbers, Robbert
Dreyer, Derek
description Rust is a new systems programming language that promises to overcome the seemingly fundamental tradeoff between high-level safety guarantees and low-level control over resource management. Unfortunately, none of Rust's safety claims have been formally proven, and there is good reason to question whether they actually hold. Specifically, Rust employs a strong, ownership-based type system, but then extends the expressive power of this core type system through libraries that internally use unsafe features. In this paper, we give the first formal (and machine-checked) safety proof for a language representing a realistic subset of Rust. Our proof is extensible in the sense that, for each new Rust library that uses unsafe features, we can say what verification condition it must satisfy in order for it to be deemed a safe extension to the language. We have carried out this verification for some of the most important libraries that are used throughout the Rust ecosystem.
doi_str_mv 10.1145/3158154
format article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3158154</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3158154</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13</originalsourceid><addsrcrecordid>eNpNj0tLxDAUhYMoOIyDf6E7V9XcSW6auNPiCwaEYVyXNLmplT6GpF3476U6C1fncPg48DF2DfwWQOKdANSA8oyttrLAHOQWzv_1S7ZJ6YtzDkZILcyKlfs5TY_UTfdZIjfHdmiy6ZOyMM6Dt1M7Dikbw--0kNkxjk20fb9wnR2a2TZ0xS6C7RJtTrlmH89Ph_I1372_vJUPu9wJ1FOOWqE2QisSRnHuAzcea5BSFdrWZMlw7RTUaJG8kwYBHEryBQbhlQWxZjd_vy6OKUUK1TG2vY3fFfBq0a9O-uIHsDBLpw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>RustBelt: securing the foundations of the Rust programming language</title><source>ACM Digital Library Complete</source><creator>Jung, Ralf ; Jourdan, Jacques-Henri ; Krebbers, Robbert ; Dreyer, Derek</creator><creatorcontrib>Jung, Ralf ; Jourdan, Jacques-Henri ; Krebbers, Robbert ; Dreyer, Derek</creatorcontrib><description>Rust is a new systems programming language that promises to overcome the seemingly fundamental tradeoff between high-level safety guarantees and low-level control over resource management. Unfortunately, none of Rust's safety claims have been formally proven, and there is good reason to question whether they actually hold. Specifically, Rust employs a strong, ownership-based type system, but then extends the expressive power of this core type system through libraries that internally use unsafe features. In this paper, we give the first formal (and machine-checked) safety proof for a language representing a realistic subset of Rust. Our proof is extensible in the sense that, for each new Rust library that uses unsafe features, we can say what verification condition it must satisfy in order for it to be deemed a safe extension to the language. We have carried out this verification for some of the most important libraries that are used throughout the Rust ecosystem.</description><identifier>ISSN: 2475-1421</identifier><identifier>EISSN: 2475-1421</identifier><identifier>DOI: 10.1145/3158154</identifier><language>eng</language><ispartof>Proceedings of ACM on programming languages, 2018-01, Vol.2 (POPL), p.1-34</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13</citedby><cites>FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Jung, Ralf</creatorcontrib><creatorcontrib>Jourdan, Jacques-Henri</creatorcontrib><creatorcontrib>Krebbers, Robbert</creatorcontrib><creatorcontrib>Dreyer, Derek</creatorcontrib><title>RustBelt: securing the foundations of the Rust programming language</title><title>Proceedings of ACM on programming languages</title><description>Rust is a new systems programming language that promises to overcome the seemingly fundamental tradeoff between high-level safety guarantees and low-level control over resource management. Unfortunately, none of Rust's safety claims have been formally proven, and there is good reason to question whether they actually hold. Specifically, Rust employs a strong, ownership-based type system, but then extends the expressive power of this core type system through libraries that internally use unsafe features. In this paper, we give the first formal (and machine-checked) safety proof for a language representing a realistic subset of Rust. Our proof is extensible in the sense that, for each new Rust library that uses unsafe features, we can say what verification condition it must satisfy in order for it to be deemed a safe extension to the language. We have carried out this verification for some of the most important libraries that are used throughout the Rust ecosystem.</description><issn>2475-1421</issn><issn>2475-1421</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNpNj0tLxDAUhYMoOIyDf6E7V9XcSW6auNPiCwaEYVyXNLmplT6GpF3476U6C1fncPg48DF2DfwWQOKdANSA8oyttrLAHOQWzv_1S7ZJ6YtzDkZILcyKlfs5TY_UTfdZIjfHdmiy6ZOyMM6Dt1M7Dikbw--0kNkxjk20fb9wnR2a2TZ0xS6C7RJtTrlmH89Ph_I1372_vJUPu9wJ1FOOWqE2QisSRnHuAzcea5BSFdrWZMlw7RTUaJG8kwYBHEryBQbhlQWxZjd_vy6OKUUK1TG2vY3fFfBq0a9O-uIHsDBLpw</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Jung, Ralf</creator><creator>Jourdan, Jacques-Henri</creator><creator>Krebbers, Robbert</creator><creator>Dreyer, Derek</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20180101</creationdate><title>RustBelt: securing the foundations of the Rust programming language</title><author>Jung, Ralf ; Jourdan, Jacques-Henri ; Krebbers, Robbert ; Dreyer, Derek</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jung, Ralf</creatorcontrib><creatorcontrib>Jourdan, Jacques-Henri</creatorcontrib><creatorcontrib>Krebbers, Robbert</creatorcontrib><creatorcontrib>Dreyer, Derek</creatorcontrib><collection>CrossRef</collection><jtitle>Proceedings of ACM on programming languages</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jung, Ralf</au><au>Jourdan, Jacques-Henri</au><au>Krebbers, Robbert</au><au>Dreyer, Derek</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RustBelt: securing the foundations of the Rust programming language</atitle><jtitle>Proceedings of ACM on programming languages</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2</volume><issue>POPL</issue><spage>1</spage><epage>34</epage><pages>1-34</pages><issn>2475-1421</issn><eissn>2475-1421</eissn><abstract>Rust is a new systems programming language that promises to overcome the seemingly fundamental tradeoff between high-level safety guarantees and low-level control over resource management. Unfortunately, none of Rust's safety claims have been formally proven, and there is good reason to question whether they actually hold. Specifically, Rust employs a strong, ownership-based type system, but then extends the expressive power of this core type system through libraries that internally use unsafe features. In this paper, we give the first formal (and machine-checked) safety proof for a language representing a realistic subset of Rust. Our proof is extensible in the sense that, for each new Rust library that uses unsafe features, we can say what verification condition it must satisfy in order for it to be deemed a safe extension to the language. We have carried out this verification for some of the most important libraries that are used throughout the Rust ecosystem.</abstract><doi>10.1145/3158154</doi><tpages>34</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2475-1421
ispartof Proceedings of ACM on programming languages, 2018-01, Vol.2 (POPL), p.1-34
issn 2475-1421
2475-1421
language eng
recordid cdi_crossref_primary_10_1145_3158154
source ACM Digital Library Complete
title RustBelt: securing the foundations of the Rust programming language
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T21%3A32%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RustBelt:%20securing%20the%20foundations%20of%20the%20Rust%20programming%20language&rft.jtitle=Proceedings%20of%20ACM%20on%20programming%20languages&rft.au=Jung,%20Ralf&rft.date=2018-01-01&rft.volume=2&rft.issue=POPL&rft.spage=1&rft.epage=34&rft.pages=1-34&rft.issn=2475-1421&rft.eissn=2475-1421&rft_id=info:doi/10.1145/3158154&rft_dat=%3Ccrossref%3E10_1145_3158154%3C/crossref%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c358t-586589386e39600df09d5b144678abeae908c61b5a5edc49511c54ed75f3d6a13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true