Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Two-Faces of WASM Security

Security BSides San Francisco via YouTube

Overview

Explore the dual nature of WebAssembly (WASM) security in this 21-minute conference talk from BSidesSF 2019. Dive into the evolution of WASM from JavaScript and asm.js, understanding its performance benefits and security model. Learn about the protective measures for users and developers, including sandboxed environments and primitives like type safety and control flow integrity. Examine the increasing use of WASM in malicious activities such as keyloggers, tech support scams, and sophisticated coin-mining scripts. Discover the challenges faced by web authors due to vulnerable WASM modules. Analyze both the malicious intent behind advanced WASM modules and the expanded attack surface created by exploitable modules. Gain insights into WASM examples, security features, attack techniques, and defensive measures through topics like EMC, Big Amount WASM, Key Lockers, Chi Miners, and Kryptonite Filter.

Syllabus

Introduction
Agenda
What is WASM
JavaScript vs WASM
WASM vs JavaScript
EMCC
Big Amount WASM
WASM Example
WASM Module
WASM Security
Key Lockers
Chi Miners
Attackers
Kryptonite
Filter
Other Views
Tricks
User Control
User Input
Buffer Overflow
Memory Diagram
MJS
Type Infusion
Signature checks
Conclusion
Questions

Taught by

Security BSides San Francisco

Reviews

Start your review of Two-Faces of WASM Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.