Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
Title | Sandcrust: Automatic Sandboxing of Unsafe Components in Rust |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Lamowski, Benjamin, Weinhold, Carsten, Lackorzynski, Adam, Härtig, Hermann |
Conference Name | Proceedings of the 9th Workshop on Programming Languages and Operating Systems |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5153-9 |
Keywords | Collaboration, composability, policy, Policy-Governed Secure Collaboration, Policy-Governed systems, pubcrawl, Sandboxing |
Abstract | System-level development has been dominated by traditional programming languages such as C and C++ for decades. These languages are inherently unsafe regarding memory management. Even experienced developers make mistakes that open up security holes or compromise the safety properties of software. The Rust programming language is targeted at the systems domain and aims to eliminate memory-related programming errors by enforcing a strict memory model at the language and compiler level. Unfortunately, these compile-time guarantees no longer hold when a Rust program is linked against a library written in unsafe C, which is commonly required for functionality where an implementation in Rust is not yet available. In this paper, we present Sandcrust, an easy-to-use sand-boxing solution for isolating code and data of a C library in a separate process. This isolation protects the Rust-based main program from any memory corruption caused by bugs in the unsafe library, which would otherwise invalidate the memory safety guarantees of Rust. Sandcrust is based on the Rust macro system and requires no modification to the compiler or runtime, but only straightforward annotation of functions that call the library's API. |
URL | https://dl.acm.org/citation.cfm?doid=3144555.3144562 |
DOI | 10.1145/3144555.3144562 |
Citation Key | lamowski_sandcrust:_2017 |