l4v VS creusot

Compare l4v vs creusot and see what are their differences.

creusot

Creusot helps you prove your code is correct in an automated fashion. [Moved to: https://github.com/creusot-rs/creusot] (by xldenis)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
l4v creusot
15 15
489 868
0.8% -
9.6 9.6
6 days ago 2 months ago
Isabelle Rust
GNU General Public License v3.0 or later GNU Lesser General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

l4v

Posts with mentions or reviews of l4v. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-28.
  • Rewrite the VP9 codec library in Rust
    5 projects | news.ycombinator.com | 28 Feb 2024
    > C/C++ can be made memory safe

    .. but it's much harder to prove your work is memory safe. sel4 is memory safe C, for example. The safety is achieved by a large external theorem prover and a synced copy written in Haskell. https://github.com/seL4/l4v

    Typechecks are form of proof. It's easier to write provably safe Rust than provably safe C because the proofs and checker are integrated.

  • CVE-2023-4863: Heap buffer overflow in WebP (Chrome)
    18 projects | news.ycombinator.com | 12 Sep 2023
    You can't really retrofit safety to C. The best that can be achieved is sel4, which while it is written in C has a separate proof of its correctness: https://github.com/seL4/l4v

    The proof is much, much more work than the microkernel itself. A proof for something as large as webP might take decades.

  • SeL4 Specification and Proofs
    1 project | news.ycombinator.com | 20 Aug 2023
  • What in the name of all that's holy is going on with software ?
    3 projects | /r/sysadmin | 7 Jun 2023
    When something like the seL4 microkernel is formally verified, the remaining bugs should only be bugs in the specification, not the implementation.
  • Elimination of programmers
    2 projects | /r/programming | 24 Nov 2022
    seL4 specifications and proofs are not a programming language.
  • Google Announces KataOS and Sparrow
    3 projects | news.ycombinator.com | 16 Oct 2022
    Yes, especially 'logically impossible' when you dig into the details. From the blogpost:

    > and the kernel modifications to seL4 that can reclaim the memory used by the rootserver.

    MMMMMMMMMMMkkkkkk. So you then have to ask: were these changes also formally verified? There's a metric ton of kernel changes here: https://github.com/AmbiML/sparrow-kernel/commits/sparrow but I don't see a fork of https://github.com/seL4/l4v anywhere inside AmbiML.

    I mean, it does also claim to be "almost entirely written in Rust", which is true if you ignore almost the entire OS part of the OS (the kernel and the minimal seL4 runtime).

  • A 24-year-old bug in the Linux Kernel (2021)
    4 projects | news.ycombinator.com | 15 Oct 2022
    Probably the only way to prevent this type of issue in an automated fashion is to change your perspective from proving that a bug exists, to proving that it doesn't exist. That is, you define some properties that your program must satisfy to be considered correct. Then, when you make optimizations such as bulk receiver fast-path, you must prove (to the static analysis tool) that your optimizations to not break any of the required properties. You also need to properly specify the required properties in a way that they are actually useful for what people want the code to do.

    All of this is incredibly difficult, and an open area of research. Probably the biggest example of this approach is the Sel4 microkernel. To put the difficulty in perspective, I checkout out some of the sel4 repositories did a quick line count.

    The repository for the microkernel itself [0] has 276,541

    The testsuite [1] has 26,397

    The formal verification repo [2] has 1,583,410, over 5 times as much as the source code.

    That is not to say that formal verification takes 5x the work. You also have to write your source-code in such a way that it is ammenable to being formally verified, which makes it more difficult to write, and limits what you can reasonably do.

    Having said that, this approach can be done in a less severe way. For instance, type systems are essentially a simple form of formal verification. There are entire classes of bugs that are simply impossible in a properly typed programs; and more advanced type systems can eliminate a larger class of bugs. Although, to get the full benefit, you still need to go out of your way to encode some invariant into the type system. You also find that mainstream languages that try to go in this direction always contain some sort of escape hatch to let the programmer assert a portion of code is correct without needing to convince the verifier.

    [0] https://github.com/seL4/seL4

    [1] https://github.com/seL4/sel4test

    [2] https://github.com/seL4/l4v

  • Formally Proven Binary Format Parsers
    2 projects | news.ycombinator.com | 4 Jul 2022
    I mean, just look at the commits with "fix" in the specs folder: https://github.com/seL4/l4v/commits/master?after=4f0bbd4fcbc...
  • Proofs and specifications
    1 project | /r/RISCV | 13 Mar 2022
    1 project | /r/kernel | 13 Mar 2022

creusot

Posts with mentions or reviews of creusot. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-31.
  • Conditioonal Compilation across Crates?
    1 project | /r/rust | 4 Jul 2023
    However, it seems that C is not "notified" whether --cfg thing is set, only the main crate being built is. Regardless of this flag, the dummy macro is always chosen. Am I doing something wrong? It should work; the Creusot project is doing something similar.
  • Kani 0.29.0 has been released!
    2 projects | /r/rust | 31 May 2023
    I believe https://github.com/xldenis/creusot is more similar in that it also uses proofs to prove rust code correct.
  • Prop v0.42 released! Don't panic! The answer is... support for dependent types :)
    5 projects | /r/rust | 18 Jan 2023
    Wow that sounds really cool! I'm not an expert but does that mean that one day you could implement dependend types or refinement types in Rust as a crate ? I currently only know of tools like: Flux Creusot Kani Prusti
  • Linus Torvalds: Rust will go into Linux 6.1
    12 projects | /r/programming | 26 Sep 2022
    Easy reasoning does not end on memory safety. For example, deductive verification of Rust code is possible exactly because there's no reference aliasing in safe Rust
  • A personal list of Rust grievances
    11 projects | news.ycombinator.com | 12 Sep 2022
    > No support for using something like separation logic within Rust itself to verify that unsafe code upholds the invariants that the safe language expects.

    I think this is something we might see in the future. There are a lot of formal methods people who are interested in rust. Creusot in particular is pretty close to doing this - at least for simpler invariants

    https://github.com/xldenis/creusot

  • Whiley, a language with statically checked pre and post conditions, releases its 0.6.1 version and portions implemented in Rust
    1 project | /r/rust | 1 Jul 2022
    Seems similar in principle to cruesot except as another language instead of as a layer on-top of rust.
  • What it feels like when Rust saves your bacon
    2 projects | news.ycombinator.com | 24 Jun 2022
    You often encounter this entire thread of rhetoric when someone wants to put a diversion into the central argument, yeah but it doesn't ____.

    But Rust does do that, match exhaustiveness, forcing the handling of errors and the type system enables things like CreuSAT [1] using creusot [2]

    [1] https://news.ycombinator.com/item?id=31780128

    [2] https://github.com/xldenis/creusot

    > Creusot works by translating Rust code to WhyML, the verification and specification language of Why3. Users can then leverage the full power of Why3 to (semi)-automatically discharge the verification conditions!

    Units of Measure, https://github.com/iliekturtles/uom

    The base properties of the language enable things that can never be done in C++.

  • Creusot: Deductive Verification of Rust
    1 project | news.ycombinator.com | 17 Jun 2022
  • What Is Rust's Unsafe?
    5 projects | news.ycombinator.com | 10 Apr 2022
    > I’ve been working on a tool: https://github.com/xldenis/creusot to put this into practice

    Note that there are other tools trying to deal with formal statements about Rust code. AIUI, Rust developers are working on forming a proper working group for pursuing these issues. We might get a RFC-standardized way of expressing formal/logical conditions about Rust code, which would be a meaningful first step towards supporting proof-carrying code within Rust.

  • AdaCore and Ferrous Systems Joining Forces to Support Rust
    14 projects | news.ycombinator.com | 2 Feb 2022
    This is exciting! I've met with people from AdaCore and Ferrous systems (individually) several times and they're all serious, competent and motivated.

    I'm curious what kinds of software they want to (eventually) verify, my PhD thesis is developing a verification tool for Rust (https://github.com/xldenis/creusot) and I'm always on the look out for case studies to push me forward.

    The road to formally verified Rust is still long but in my unbiased opinion looking quite bright, especially compared to other languages like C.

What are some alternatives?

When comparing l4v and creusot you can also consider the following projects:

seL4 - The seL4 microkernel

misra-rust - An investigation into what adhering to each MISRA-C rule looks like in Rust. The intention is to decipher how much we "get for free" from the Rust compiler.

hubris - A lightweight, memory-protected, message-passing kernel for deeply embedded systems.

Daikon - Dynamic detection of likely invariants

agda-stdlib - The Agda standard library

cryptography - cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.

hacspec - Please see https://github.com/hacspec/hax

codeball-action - 🔮 Codeball – AI Code Review that finds bugs and fast-tracks your code

CreuSAT - CreuSAT - A formally verified SAT solver written in Rust and verified with Creusot.

cross - “Zero setup” cross compilation and “cross testing” of Rust crates

ed25519-dalek - Fast and efficient ed25519 signing and verification in Rust.