Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is WASM
4
JavaScript vs WASM
5
WASM vs JavaScript
6
EMCC
7
Big Amount WASM
8
WASM Example
9
WASM Module
10
WASM Security
11
Key Lockers
12
Chi Miners
13
Attackers
14
Kryptonite
15
Filter
16
Other Views
17
Tricks
18
User Control
19
User Input
20
Buffer Overflow
21
Memory Diagram
22
MJS
23
Type Infusion
24
Signature checks
25
Conclusion
26
Questions
Description:
Explore the dual nature of WebAssembly (WASM) security in this 21-minute conference talk from BSidesSF 2019. Dive into the evolution of WASM from JavaScript and asm.js, understanding its performance benefits and security model. Learn about the protective measures for users and developers, including sandboxed environments and primitives like type safety and control flow integrity. Examine the increasing use of WASM in malicious activities such as keyloggers, tech support scams, and sophisticated coin-mining scripts. Discover the challenges faced by web authors due to vulnerable WASM modules. Analyze both the malicious intent behind advanced WASM modules and the expanded attack surface created by exploitable modules. Gain insights into WASM examples, security features, attack techniques, and defensive measures through topics like EMC, Big Amount WASM, Key Lockers, Chi Miners, and Kryptonite Filter.

Two-Faces of WASM Security

Security BSides San Francisco
Add to list