YoVDO

Sandboxing Wasm Programs - Syscall Isolation Techniques for Edge Computing

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

WebAssembly Courses Edge Computing Courses System Calls Courses Sandboxing Courses SELinux Courses Cgroups Courses Runtime Security Courses Seccomp Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of sandboxing WebAssembly (Wasm) programs in this 26-minute conference talk by Ryan Petrich from Two Sigma Investments. Delve into the challenges of safely running multi-tenant code on shared hardware for edge computing platforms. Examine how major Wasm runtimes construct their sandboxes and confine running programs, while understanding potential vulnerabilities such as side channels, configuration errors, and runtime bugs. Discover additional sandboxing techniques including SELinux, cgroups, and seccomp. Learn about Callander, a novel syscall sandboxing tool designed to impede shellcode execution. Gain insights into enhancing the Wasm ecosystem's security approach with monitoring, bubble wrap, and protective measures to ensure robust isolation and safeguard against malicious activities.

Syllabus

Syscall Me by Your Name: Sandboxing Wasm Programs - Ryan Petrich, Two Sigma Investments


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cloud Application Security
University of Minnesota via Coursera
Cybersecurity Awareness: Social Engineering
LinkedIn Learning
Ethical Hacking: The Complete Malware Analysis Process
LinkedIn Learning
iOS Development: Security
LinkedIn Learning
Securing the Use of Generative AI in Your Organization
LinkedIn Learning