YoVDO

The Now and the Future of Malicious WebAssembly

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Web Development Courses Programming Courses Data Mining Courses Cybersecurity Courses WebAssembly Courses Cryptojacking Courses Obfuscation Courses

Course Description

Overview

Explore the current landscape and future implications of malicious WebAssembly in this 31-minute conference talk. Delve into the evolution of WebAssembly since its introduction in March 2017, examining its performance benefits and various ports. Gain insights into attacker models, prevalence, and usage patterns through comprehensive crawling and cluster analysis. Investigate custom implementations, libraries, and test cases, with a focus on gaming applications. Learn about cryptojacking and mining techniques, as well as obfuscation methods employed by malicious actors. Conclude with a discussion on potential future developments and their impact on web security.

Syllabus

Intro
The native Web
WebAssembly (Wasm) Introduced March 2017
Wasm performance
Wasm ports
Using Wasm modules
Attacker models
Crawling
Prevalence
Extent of usage
Cluster analysis
Custom, Library and Test
Games
Primer on mining
Cryptojacking/ Mining
Obfuscation
Possible progress
Conclusion


Taught by

OWASP Foundation

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube