TY - GEN
T1 - System Programming in Rust
T2 - 16th Workshop on Hot Topics in Operating Systems, HotOS 2017
AU - Balasubramanian, Abhiram
AU - Baranowski, Marek S.
AU - Burtsev, Anton
AU - Panda, Aurojit
AU - Rakamari, Zvonimir
AU - Ryzhyk, Leonid
N1 - Publisher Copyright:
© 2017 ACM.
PY - 2017/5/7
Y1 - 2017/5/7
N2 - Rust is a new system programming language that offers a practical and safe alternative to C. Rust is unique in that it enforces safety without runtime overhead, most importantly, without the overhead of garbage collection. While zero-cost safety is remarkable on its own, we argue that the superpowers of Rust go beyond safety. In particular, Rust's linear type system enables capabilities that cannot be implemented efficiently in traditional languages, both safe and unsafe, and that dramatically improve security and reliability of system software. We show three examples of such capabilities: zero-copy software fault isolation, efficient static information flow analysis, and automatic checkpointing. While these capabilities have been in the spotlight of systems research for a long time, their practical use is hindered by high cost and complexity. We argue that with the adoption of Rust these mechanisms will become commoditized.
AB - Rust is a new system programming language that offers a practical and safe alternative to C. Rust is unique in that it enforces safety without runtime overhead, most importantly, without the overhead of garbage collection. While zero-cost safety is remarkable on its own, we argue that the superpowers of Rust go beyond safety. In particular, Rust's linear type system enables capabilities that cannot be implemented efficiently in traditional languages, both safe and unsafe, and that dramatically improve security and reliability of system software. We show three examples of such capabilities: zero-copy software fault isolation, efficient static information flow analysis, and automatic checkpointing. While these capabilities have been in the spotlight of systems research for a long time, their practical use is hindered by high cost and complexity. We argue that with the adoption of Rust these mechanisms will become commoditized.
UR - http://www.scopus.com/inward/record.url?scp=85027989477&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85027989477&partnerID=8YFLogxK
U2 - 10.1145/3102980.3103006
DO - 10.1145/3102980.3103006
M3 - Conference contribution
AN - SCOPUS:85027989477
T3 - Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS
SP - 156
EP - 161
BT - HotOS 2017 - Proceedings of the 16th Workshop on Hot Topics in Operating Systems
PB - IEEE Computer Society
Y2 - 7 May 2017 through 10 May 2017
ER -