Carnegie Mellon University
Browse
- No file added yet -

Rust Vulnerability Analysis and Maturity Challenges

Download (127.45 kB)
online resource
posted on 2023-01-31, 14:25 authored by Garret WassermannGarret Wassermann, David SvobodaDavid Svoboda

While the memory safety and security features of the Rust programming language can be effective in many situations,  Rust’s compiler is very particular on what constitutes good software  design practices. Whenever design assumptions disagree with real-world  data and assumptions, there is the possibility of security  vulnerabilities–and malicious software that can take advantage of those  vulnerabilities. In this post, we will focus on users of Rust programs,  rather than Rust developers. We will explore some tools for  understanding vulnerabilities whether the original source code is  available or not. These tools are important for understanding malicious  software where source code is often unavailable, as well as commenting  on possible directions in which tools and automated code analysis can  improve. We also comment on the maturity of the Rust software ecosystem  as a whole and how that might impact future security responses,  including via the coordinated vulnerability disclosure methods advocated by the SEI’s CERT Coordination Center (CERT/CC). This  post is the second in a series exploring the Rust programming language. The first post explored security issues with Rust. 

History

Publisher Statement

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/AZS 5 Eglin Street Hanscom AFB, MA 01731-2100 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

Copyright Statement

Copyright 2023 Carnegie Mellon University.

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC