[FEATURE] Rust FFI & C verification boundary #113
Labels
enhancement
New feature or request
SoW TA2.1.1.C
Develop CN specifications for components with rich code-level specifications.
Milestone
Summary
Provide an example of Rust <-> C interface, such that the C portion of the code is verified with CN, and the Rust part is (ideally) verified with Verus (or similar - crux-mir or Kani) (see the use of Verus for seL4 Rust userspace here).
Consider the Rust part trusted while the C portion of code is untrusted. The main issue is marshaling complex datastructures, and tracking their ownership. This example uses vectors.
Ada/SPARK have FFI as well (see docs here), I am expecting that the C code will have similar concerns (ownership and complex data structures).
Relevant article from google about Rust in Android: https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html?m=1
The text was updated successfully, but these errors were encountered: