Please use this identifier to cite or link to this item:
Publication type: Conference paper
Type of review: Peer review (abstract)
Title: Rust for secure IoT applications : why C is getting rusty
Authors: Noseda, Mario
Frei, Fabian
Rüst, Andreas
Künzli, Simon
et. al: No
DOI: 10.21256/zhaw-25046
Conference details: Embedded World Conference 2022, Nuremberg, 21-23 June 2022
Issue Date: Jun-2022
Publisher / Ed. Institution: WEKA
Language: English
Subjects: Bare-metal programming; C; CPP; Cybersecurity; Embedded system; Exploit; IoT; Memory unsafety; Rust
Subject (DDC): 005: Computer programming, programs and data
Abstract: Memory corruption is still the most used type of exploit in today’s malware landscape. Human error inevitably introduces memory vulnerabilities into software by using memory-unsafe languages like C and C++, affecting not only security but also safety, dependability, and even basic functionality of devices. The Rust language guarantees memory safety without a garbage collector, promises comparable performance to C/C++, and allows for gradual extension of existing codebases by using its foreign function interface. This report presents the risks of having memory vulnerabilities in embedded applications, what a switch to Rust looks like, how the development experiences differ between Rust and C/C++, and if there are significant differences in performance.
Fulltext version: Published version
License (according to publishing contract): Licence according to publishing contract
Departement: School of Engineering
Organisational Unit: Institute of Embedded Systems (InES)
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
2022_Noseda-etal_Rust-for-secure-IoT-applications.pdf454.63 kBAdobe PDFThumbnail

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.