Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Towards a Rust-Like Borrow Checker for C
Publication

Publications

Towards a Rust-Like Borrow Checker for C

Title
Towards a Rust-Like Borrow Checker for C
Type
Article in International Scientific Journal
Year
2024
Authors
Silva, T
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Correia, P
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Sousa, L
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Carvalho, T
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
ISSN: 1539-9087
Publisher: ACM
Other information
Authenticus ID: P-017-CWJ
Abstract (EN): <jats:p>Memory safety issues in C are the origin of various vulnerabilities that can compromise a program¿s correctness or safety from attacks. We propose an approach to tackle memory safety by replicating Rust¿s Mid-level Intermediate Representation (MIR) Borrow Checker. Our solution uses static analysis and successive source-to-source code transformations to be composed upstream of the compiler, ensuring maximal compatibility with existing build systems. This allows us to apply the memory safety guarantees of the rustc compiler to C code with fewer changes than a rewrite in Rust. In this work, we present a comprehensive study of Rust¿s efforts towards ensuring memory safety, and describe the theoretical basis for a C borrow checker, alongside a proof-of-concept that was developed to demonstrate its potential. We have evaluated the prototype on the CHStone and bzip2 benchmarks. This prototype correctly identified violations of the ownership and aliasing rules, and exposed incompatibilities between such rules and common C patterns, which can be addressed in future work.</jats:p>
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Techniques and Analysis for Mixed-criticality Scheduling with Mode-dependent Server Execution Budgets (2019)
Article in International Scientific Journal
Pedro F. Souto; Muhammad Ali Awan; Konstantions Bletsas; Benny Akesson; Eduardo Tovar
Online Processing of Vehicular Data on the Edge Through an Unsupervised TinyML Regression Technique (2024)
Article in International Scientific Journal
Andrade, P; Silva, I; Diniz, M; Flores, T; Costa, DG; Soares, E
Minimal-Overlap Centrality for Multi-Gateway Designation in Real-Time TSCH Networks (2024)
Article in International Scientific Journal
Gaitán, MG; Luis Almeida; D'Orey, PM; Santos, PM; Watteyne, T
Guidelines for a graduate curriculum on embedded software and systems (2005)
Article in International Scientific Journal
Caspi, P; Vincentelli, ALS; Luis Almeida; Benveniste, A; Bouyssounouse, B; Buttazzo, GC; Crnkovic, I; Damm, W; Engblom, J; Fohler, G; Valls, MG; Kopetz, H; Lakhnech, Y; Laroussinie, F; Lavagno, L; Lipari, G; Maraninchi, F; Peti, P; Puente, JAdl; Scaife, N...(mais 8 authors)
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-14 at 21:52:59 | Privacy Policy | Personal Data Protection Policy | Whistleblowing