2019 IEEE 17th International Conference on Industrial Informatics (INDIN) 2019
DOI: 10.1109/indin41052.2019.8972014
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Safety Functions Implemented in Rust - a Symbolic Execution based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…An interesting feature is support for automatically deriving "proof drivers" using a technique reminiscent of that for test case generation [22]. KLEE employs symbolic execution and was also extended to support Rust [16,17]. Unlike CRUST this tool considers a larger number of errors, including arithmetic overflow and buffer overruns (ie., not just those related to memory unsafety).…”
Section: Related Workmentioning
confidence: 99%
“…An interesting feature is support for automatically deriving "proof drivers" using a technique reminiscent of that for test case generation [22]. KLEE employs symbolic execution and was also extended to support Rust [16,17]. Unlike CRUST this tool considers a larger number of errors, including arithmetic overflow and buffer overruns (ie., not just those related to memory unsafety).…”
Section: Related Workmentioning
confidence: 99%
“…This employs a custom C code generator for £ ¢ ¡ rustc and correctly identified bugs arising during development of Rust's standard library. Finally the widely used symbolic execution tool, Klee [27], was also extended for Rust allowing assertions to be checked statically [83,84].…”
Section: Rustmentioning
confidence: 99%