YoVDO

Two-Faces of WASM Security

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Web Development Courses Keylogger Courses Type Safety Courses Control-Flow Integrity Courses

Course Description

Overview

Explore the dual nature of WebAssembly (WASM) security in this 21-minute conference talk from BSidesSF 2019. Dive into the evolution of WASM from JavaScript and asm.js, understanding its performance benefits and security model. Learn about the protective measures for users and developers, including sandboxed environments and primitives like type safety and control flow integrity. Examine the increasing use of WASM in malicious activities such as keyloggers, tech support scams, and sophisticated coin-mining scripts. Discover the challenges faced by web authors due to vulnerable WASM modules. Analyze both the malicious intent behind advanced WASM modules and the expanded attack surface created by exploitable modules. Gain insights into WASM examples, security features, attack techniques, and defensive measures through topics like EMC, Big Amount WASM, Key Lockers, Chi Miners, and Kryptonite Filter.

Syllabus

Introduction
Agenda
What is WASM
JavaScript vs WASM
WASM vs JavaScript
EMCC
Big Amount WASM
WASM Example
WASM Module
WASM Security
Key Lockers
Chi Miners
Attackers
Kryptonite
Filter
Other Views
Tricks
User Control
User Input
Buffer Overflow
Memory Diagram
MJS
Type Infusion
Signature checks
Conclusion
Questions


Taught by

Security BSides San Francisco

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube