Planned intervention: On Wednesday June 26th 05:30 UTC Zenodo will be unavailable for 10-20 minutes to perform a storage cluster upgrade.
Published August 15, 2019 | Version v1
Software Open

Software Artefact for the OOPSLA'19 Paper Titled "Leveraging Rust Types for Modular Specification and Verification"

Description

Abstract

Rust's type system ensures memory safety: well-typed Rust programs are guaranteed to not exhibit problems such as dangling pointers, data races, and unexpected side effects through aliased references. Ensuring correctness properties beyond memory safety, for instance, the guaranteed absence of assertion failures or more-general functional correctness, requires static program verification. For traditional system programming languages, formal verification is notoriously difficult and requires complex specifications and logics to reason about pointers, aliasing, and side effects on mutable state. This complexity is a major obstacle to the more-widespread verification of system software.

In this paper, we present a novel verification technique that leverages Rust's type system to greatly simplify the specification and verification of system software written in Rust. We analyse information from the Rust compiler and synthesise a corresponding core proof for the program in a flavour of separation logic tailored to automation. To verify correctness properties beyond memory safety, users can annotate Rust programs with specifications at the abstraction level of Rust expressions; our technique weaves them into the core proof to verify modularly whether these specifications hold. Crucially, our proofs are constructed and checked automatically without exposing the underlying formal logic, allowing users to work exclusively at the level of abstraction of the programming language. As such, our work enables a new kind of verification tool, with the potential to impact a wide audience and allow the Rust community to benefit from state-of-the-art verification techniques. We have implemented our techniques for a subset of Rust; our evaluation on several thousand functions from widely-used Rust crates demonstrates its effectiveness.

Artefact

This artefact contains a virtual machine that can be used to reproduce the evaluation of our paper. You can find the instructions in the README.pdf file.

If you are interested in building on top of our research results, you can find the latest version of Prusti in our GitHub repository: https://github.com/viperproject/prusti-dev.

Paper

An extended version of the paper can be found here.

Files

README.pdf

Files (7.2 GB)

Name Size Download all
md5:f956358ff49a5b8498724ce6d3b9bd3f
1.3 kB Download
md5:d6cf6291047a9490113245a55b436d6a
188.9 kB Preview Download
md5:67c4ad32346df59e64b9688f762bb92b
7.2 GB Preview Download

Additional details

Related works

Is supplement to
10.3929/ethz-b-000311092 (DOI)

Funding

From Type Capabilities to Permissions for Program Verification (and back again) 200021_169503
Swiss National Science Foundation