Sysgo ports Rust to PikeOS

Sysgo ports Rust to PikeOS

New Products |
By Christoph Hammerschmidt

Sysgo in Germany has ported the Rust programming language to its PikeOS real-time operating system and hypervisor.

This means no guest operating system or Posix API is needed as Rust applications can run as a native PikeOS instance. This boosts the usability of Rust and certification against industry-specific safety standards.

The Rust implementation has been implemented in such a way that essential PikeOS features can be used. These include the Certifiable File System, Communication Ports and Property Management. Together with PikeOS (version 5.1.3), which is certified against the Common Criteria at level EAL 5+, Rust forms a cyber-secure and functionally secure basis for embedded applications that is unprecedented in the safe-and-secure platform and embedded system landscape, promises PikeOS manufacturer Sysgo.

Areas of application for the combination of both technologies can be found everywhere where no compromises can be made in system protection, such as in secure gateways and in applications that must meet the highest demands for functional safety. Main target groups are the automotive industry as well as avionics, medical technology, railways and certain branches of the industry.

PikeOS is also pre-certified according to many industry software safety standards such as ISO 26262 for automotive, DO-178C for avionics, EN 50128 and EN 50657 for railway and IEC 62304 for medical. The focus on the combination of safety and security takes into account the recognition that functional safety is nowadays increasingly also a matter of security.

Rust is characterised by strong data type security as well as a preventive security concept that makes it easier for programmers to detect and avoid safety-critical errors at the development stage. This helps to reduce vulnerabilities in applications and thus protect against malicious cyber attacks.

A major strength of Rust, which is repeatedly demonstrated in practice, is its much lower susceptibility to buffer overflows compared to other programming languages. This eliminates one of the main attack vectors that hackers use to force an escalation of rights and thus gain control of a system.

Related articles:


If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News


Linked Articles