Acknowledgement
This work was supported by the NationalResearch Foundation of Korea(NRF) grant fundedby the Korea government(MSIT)(RS-2023-00277326). This work was supported bythe BK21 FOUR program of the Education andResearch Program for Future ICT Pioneers, SeoulNational University in 2024. This work wassupported by Inter-University SemiconductorResearch Center (ISRC). This work wassupported by Institute of Information &communications Technology Planning &Evaluation (IITP) under the artificial intelligencesemiconductor support program to nurture thebest talents (IITP-2023-RS-2023-00256081) grantfunded by the Korea government(MSIT).
References
- Liu, Peiming, Gang Zhao, and Jeff Huang, "Securing unsafe rust programs with XRust.", Proceedings of the ACM/IEEE International Conference on Software Engineering, 42nd, 2020, pp 234-245.
- Bang I, Kayondo M, Moon H, Paek Y, {TRust}: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code, USENIX Security Symposium (USENIX Security 23), 32nd , 2023, pp. 6947-6964.
- Kirth P, Dickerson M, Crane S, Larsen P, Dabrowski A, Gens D, Na Y, Volckaert S, Franz M, PKRU-Safe: Automatically locking down the heap between safe and unsafe languages, Proceedings of the European Conference on Computer Systems, 17th, pp. 132-148.
- Lamowski B, Weinhold C, Lackorzynski A, Hartig H, Sandcrust: Automatic sandboxing of unsafe components in rust. Proceedings of the Workshop on Programming Languages and Operating Systems, 9th, 2017, pp. 51-57.
- Rivera E, Mergendahl S, Shrobe H, Okhravi H, Burow N. Keeping safe rust safe with galeed. Proceedings of the Annual Computer Security Applications Conference, 37th, pp. 824-836.