misra-rust VS high-assurance-rust

Compare misra-rust vs high-assurance-rust and see what are their differences.

misra-rust

An investigation into what adhering to each MISRA-C rule looks like in Rust. The intention is to decipher how much we "get for free" from the Rust compiler. (by PolySync)

high-assurance-rust

A free book about developing secure and robust systems software. (by tnballo)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
misra-rust high-assurance-rust
8 7
112 1,262
3.6% -
0.0 7.4
almost 3 years ago 17 days ago
Rust Rust
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

misra-rust

Posts with mentions or reviews of misra-rust. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-28.
  • United States White House Report on Memory Safe Programming [pdf]
    5 projects | news.ycombinator.com | 28 Feb 2024
    MISRA and Ferrocene are not really related.

    MISRA is, as you say, a set of rules for writing C code, that restrict what you can do.

    Ferrocene is a qualified compiler. You write any normal Rust code you want: it's still the upstream Rust compiler. There are no restrictions.

    Incidentally, someone has compared what MISRA does to what Rust does: https://github.com/PolySync/misra-rust/blob/master/MISRA-Rul...

    Given that they can't repeat the MISRA stuff there, it's a bit disjoined, but it sure is interesting!

  • Misra C++:2023 Published
    4 projects | news.ycombinator.com | 17 Dec 2023
    A fun github repo: "what would MISRA look like applied to Rust" https://github.com/PolySync/misra-rust/blob/master/MISRA-Rul...

    (They're comparing with the C version, not the C++ version...)

  • Memory Safe Languages in Android 13
    7 projects | news.ycombinator.com | 1 Dec 2022
  • Ferrocene: Rust toolchain to safety-critical environments
    2 projects | news.ycombinator.com | 26 Jul 2022
    > There are huge swathes of MISRA which forbid things which not only aren't possible in Rust or SPARK

    I can't vouch for its accuracy, but https://github.com/PolySync/misra-rust

  • High Assurance Rust: Developing Secure and Robust Software
    4 projects | news.ycombinator.com | 28 Mar 2022
    When it comes to MISRA C, it is interesting to note how many (a majority) of its rules do not apply or have native enforcement[1].

    You might have also seen the AUTOSTAR Rust in Automotive Working Group announcement recently[2].

    [1]: https://github.com/PolySync/misra-rust/blob/master/MISRA-Rul...

    [2]: for some reason the announcement was removed from the "News and events" site, https://webcache.googleusercontent.com/search?q=cache%3Ahttp... but it is still available as a PDF https://www.autosar.org/fileadmin/user_upload/20220308_RustW...

  • AUTOSAR announces new Working Group for Programming Language Rust in Automotive Software context
    1 project | /r/embedded | 15 Mar 2022
    There's actually already a comparison: https://github.com/PolySync/misra-rust/blob/master/MISRA-Rules.md
  • AdaCore and Ferrous Systems Joining Forces to Support Rust
    14 projects | news.ycombinator.com | 2 Feb 2022
    Rust makes quite a few things more rigorous (e.g. pairing allocations with deallocations and reference validity). It basically fulfills the job of a static analyzer baked into the language.

    It's also a vastly more analyzable language (in that its syntax is reasonably unambiguous and there's no dynamic runtime in play) and it can be integrated well.

    Toolchain quality (error reporting, built in testing, awareness of primitives like "libraries", etc.) is also a huge strong point.

    We're reasonably confident that we can use safe Rust as is, with strong guidance on how to do unsafe Rust.

    For a tangible investigation of that space, PolySync has a project that has a look at MISRA rules from a Rust perspective. https://github.com/PolySync/misra-rust/blob/master/MISRA-Rul...

    Ada is a good example here: the language has not evolved something like MISRA-C (it has evolved SPARK for formal verification, but I see that differently).

  • Resources for learning C/C++ coming from a Rust background
    1 project | /r/rust | 19 Jan 2022

high-assurance-rust

Posts with mentions or reviews of high-assurance-rust. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-08.

What are some alternatives?

When comparing misra-rust and high-assurance-rust you can also consider the following projects:

Welcome - Welcome to AeroRust- a Rust 🦀 in Aerospace 🚀 community & working group

cr4sh_ - cr4sh_ (pronounced crash, because it crashes all the time) is a Linux shell fully written with Rust. This can be used for educational purposes and is a great intro to Systems Programming

creusot - Creusot helps you prove your code is correct in an automated fashion. [Moved to: https://github.com/creusot-rs/creusot]

code - Source code for the book Rust in Action

rubble - (going to be a) BLE stack for embedded Rust

onelinerhub - Thousands of code solutions with clear explanation @ onelinerhub.com

rust-verification-tools - RVT is a collection of tools/libraries to support both static and dynamic verification of Rust programs.

fornjot - Early-stage b-rep CAD kernel, written in the Rust programming language.

wayland-ada - Ada 2012 bindings for Wayland

book - The Rust Programming Language

orenda - An experiment in language design and compiler building.

serde - Serialization framework for Rust