dc.contributor.advisor | Shrobe, Howard | |
dc.contributor.advisor | Okhravi, Hamed | |
dc.contributor.advisor | Burow, Nathan | |
dc.contributor.author | Rivera, Elijah E. | |
dc.date.accessioned | 2022-01-14T14:46:57Z | |
dc.date.available | 2022-01-14T14:46:57Z | |
dc.date.issued | 2021-06 | |
dc.date.submitted | 2021-06-17T20:14:11.077Z | |
dc.identifier.uri | https://hdl.handle.net/1721.1/139052 | |
dc.description.abstract | Rust is a programming language that simultaneously offers high performance and strong security guarantees. However, these guarantees come at the cost of strict compiler checks that sometimes prevent necessary code patterns. The unsafe keyword allows developers to bypass these compiler checks, and is used in both pure Rust and mixed-language applications. But the use of unsafe undermines the security guarantees of Rust that make it an attractive option in the first place.
We first demonstrate that within a real-world pure Rust application, many uses of unsafe can be eliminated,or reduced to formally verifiable standard libraries. We then present Galeed, a system for isolating and protecting the Rust heap from access by other programming languages using Intel’s Memory Protection Key (MPK) technology. We demonstrate both the effectiveness and efficiency of Galeed on Firefox, a web browser written in Rust and C++. | |
dc.publisher | Massachusetts Institute of Technology | |
dc.rights | In Copyright - Educational Use Permitted | |
dc.rights | Copyright MIT | |
dc.rights.uri | http://rightsstatements.org/page/InC-EDU/1.0/ | |
dc.title | Preserving Memory Safety in Safe Rust during Interactions with Unsafe Languages | |
dc.type | Thesis | |
dc.description.degree | M.Eng. | |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
mit.thesis.degree | Master | |
thesis.degree.name | Master of Engineering in Electrical Engineering and Computer Science | |