Software vendor Sysgo has ported the safety and security-optimised programming language Rust to its real-time operating system and hypervisor PikeOS.
For the use of applications based on Rust, no guest operating system and no interface like Posix is necessary: Applications can run as a native PikeOS instance.
The usability of Rust and are thus resource-efficient in use and at the same time easier to certify against industry-specific safety standards. The Rust implementation has been implemented in such a way that essential PikeOS features can be used. These include the Certifiable File System, Communication Ports and Property Management. Together with PikeOS (version 5.1.3), which is certified against the Common Criteria at level EAL 5+, Rust forms a cyber-secure and functionally secure basis for embedded applications that is unprecedented in the safe-and-secure platform and embedded system landscape, promises PikeOS manufacturer Sysgo.
Areas of application for the combination of both technologies can be found everywhere where no compromises can be made in system protection, such as in secure gateways and in applications that must meet the highest demands for functional safety. Main target groups are the automotive industry as well as avionics, medical technology, railways and certain branches of the industry.
- Sysgo and Candera roll hypervisor-based automotive solution
- PikeOS 5.0 simplifies development of safety-critical systems
PikeOS is also pre-certified according to many industry software safety standards such as ISO 26262 for automotive, DO-178C for avionics, EN 50128 and EN 50657 for railway and IEC 62304 for medical. The focus on the combination of safety and security takes into account the recognition that functional safety is nowadays increasingly also a matter of security.
Among other things, Rust is characterised by strong data type security as well as a preventive security concept that makes it easier for programmers to detect and avoid safety-critical errors at the development stage. As a consequence, this helps to reduce vulnerabilities in applications and thus protect against malicious cyber attacks. A major strength of Rust, which is repeatedly demonstrated in practice, is its much lower susceptibility to buffer overflows compared to other programming languages. This eliminates one of the main attack vectors that hackers use to force an escalation of rights and thus gain control of a system.