The C programming language is infamous for its ability to be exploited,thus it raises several security concerns. This thesis aims to investigate whether Rust can successfully prevent commonly known C programming errors and if it is a safe choice as a low-level programming language. This was done by selecting a total of 20 commonly known critical C programming errors and implementing them in both C and in Rust to observe the outcome and attempt to draw a conclusion from a safety point of view. The results show that 55% of programming errors were inexpressible by Rusts language design, 30% were detected by the compiler and 15% were flagged faults. The results for the sameprogramming errors in C showed that 85% went completely undetected by th...
Many computing systems today are written in weakly typed languages such as C and C++. These language...
Finding errors in software is a difficult problem: millions of dollars are spent in testing and debu...
Secure enclaves are commonly used for securing sensitive data and computation. However, an enclave c...
Infrastructure software is written in low-level programming languages like C toallow precise control...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
Writing bug free computer code is a challenging task in a low-level language like C. While C compile...
Most of the software stack is built upon C today. C is a very flexible language, but the flexibility...
Memory corruption is still the most used type of exploit in today’s malware landscape. Human error i...
Dissertação de mestrado integrado em Engenharia InformáticaThe C programming language is perhaps the...
Rust is a programming language that simultaneously offers high performance and strong security guara...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
This thesis deals with exploiting techniques, using programming errors of C language programs. Work ...
Rust is a type-safe system programming language with a compiler checking memory and concurrency safe...
Embedded computer systems are an invisible, ever-growing part of our lives. Through market trends, l...
Many computing systems today are written in weakly typed languages such as C and C++. These language...
Finding errors in software is a difficult problem: millions of dollars are spent in testing and debu...
Secure enclaves are commonly used for securing sensitive data and computation. However, an enclave c...
Infrastructure software is written in low-level programming languages like C toallow precise control...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
Writing bug free computer code is a challenging task in a low-level language like C. While C compile...
Most of the software stack is built upon C today. C is a very flexible language, but the flexibility...
Memory corruption is still the most used type of exploit in today’s malware landscape. Human error i...
Dissertação de mestrado integrado em Engenharia InformáticaThe C programming language is perhaps the...
Rust is a programming language that simultaneously offers high performance and strong security guara...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
This thesis deals with exploiting techniques, using programming errors of C language programs. Work ...
Rust is a type-safe system programming language with a compiler checking memory and concurrency safe...
Embedded computer systems are an invisible, ever-growing part of our lives. Through market trends, l...
Many computing systems today are written in weakly typed languages such as C and C++. These language...
Finding errors in software is a difficult problem: millions of dollars are spent in testing and debu...
Secure enclaves are commonly used for securing sensitive data and computation. However, an enclave c...