Главная
Study mode:
on
1
Intro
2
The native Web
3
WebAssembly (Wasm) Introduced March 2017
4
Wasm performance
5
Wasm ports
6
Using Wasm modules
7
Attacker models
8
Crawling
9
Prevalence
10
Extent of usage
11
Cluster analysis
12
Custom, Library and Test
13
Games
14
Primer on mining
15
Cryptojacking/ Mining
16
Obfuscation
17
Possible progress
18
Conclusion
Description:
Explore the current landscape and future implications of malicious WebAssembly in this 31-minute conference talk. Delve into the evolution of WebAssembly since its introduction in March 2017, examining its performance benefits and various ports. Gain insights into attacker models, prevalence, and usage patterns through comprehensive crawling and cluster analysis. Investigate custom implementations, libraries, and test cases, with a focus on gaming applications. Learn about cryptojacking and mining techniques, as well as obfuscation methods employed by malicious actors. Conclude with a discussion on potential future developments and their impact on web security.

The Now and the Future of Malicious WebAssembly

OWASP Foundation
Add to list
0:00 / 0:00