Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation 2020
DOI: 10.1145/3385412.3386036
|View full text |Cite
|
Sign up to set email alerts
|

Understanding memory and thread safety practices and issues in real-world Rust programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(14 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…To programmers, this manifests as a large number of false positive errors or warnings about problems that will never arise in practice. Many programmers find Rust hard to learn and to use correctly [1,4,29,22,30]. Rust's version of ownership types [23] bans common idioms such as circular or doublylinked lists, to the point where the difficulty of implementing a data structure often taught at first year has now become an Internet trope [3,26,17,9].…”
Section: Rusty Linksmentioning
confidence: 99%
“…To programmers, this manifests as a large number of false positive errors or warnings about problems that will never arise in practice. Many programmers find Rust hard to learn and to use correctly [1,4,29,22,30]. Rust's version of ownership types [23] bans common idioms such as circular or doublylinked lists, to the point where the difficulty of implementing a data structure often taught at first year has now become an Internet trope [3,26,17,9].…”
Section: Rusty Linksmentioning
confidence: 99%
“…Jung [2016]) and addressing it, in general, requires extremely sophisticated formal reasoning, as explored in the context of the RustBelt project [Jung et al 2018]. Qin et al [2020] perform manual code inspections of 850 selected instances of unsafe Rust, i.e., unsafe blocks or functions, to elicit the motivation for using unsafe code and to explore the memory safety and concurrency errors caused by these instances of unsafe code. They select examples for their study by analysing bug reports and filtering commit messages for keywords indicating memory errors.…”
Section: Related Workmentioning
confidence: 99%
“…The different JVM crash patterns caused by those usages are analyzed by Huang et al [13]. Recently, two studies analyzed unsafe usages in Rust projects and identified that unsafe is widely used to improve performance or to reuse existing code [3], [14]. Furthermore, work was presented on how to ensure memory safety while using unsafe in Rust [15].…”
Section: Related Workmentioning
confidence: 99%