Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What I am most curious about is the final paragraph of https://github.com/immunant/c2rust#acknowledgements-and-lice...

There was a while there where they were trying to test this out on the cvs codebase, IIRC. It's a good candidate: upstream doesn't exactly move quickly, but is very much a real-world codebase, still in use.



Interesting, this paper also mentions the same DARPA contract: https://apps.dtic.mil/sti/pdfs/AD1084807.pdf

It shows up in this document of contracts: https://www.esd.whs.mil/Portals/54/Documents/FOID/Reading%20...

  * Contract Number: FA875015C0124
  * Performer Name: GALOIS, INC.
  * Agent Name: AFRL, Information Directorate MR
  * Program Name: Cyber Fault-tolerant Attack Recovery (CFAR)
  * Office: I2O
  * Fiscal Year: 2015
  * Obligated ($): 2,099,878




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: