Доверя́й, но проверя́й: SFI safety for native-compiled Wasm

5Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

WebAssembly (Wasm) is a platform-independent bytecode that offers both good performance and runtime isolation. To implement isolation, the compiler inserts safety checks when it compiles Wasm to native machine code. While this approach is cheap, it also requires trust in the compiler's correctness-trust that the compiler has inserted each necessary check, correctly formed, in each proper place. Unfortunately, subtle bugs in the Wasm compiler can break-and have broken-isolation guarantees. To address this problem, we propose verifying memory isolation of Wasm binaries post-compilation. We implement this approach in VeriWasm, a static offline verifier for native x86-64 binaries compiled from Wasm; we prove the verifier's soundness, and find that it can detect bugs with no false positives. Finally, we describe our deployment of VeriWasm at Fastly.

Cite

CITATION STYLE

APA

Johnson, E., Thien, D., Alhessi, Y., Narayan, S., Brown, F., Lerner, S., … Stefan, D. (2021). Доверя́й, но проверя́й: SFI safety for native-compiled Wasm. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society. https://doi.org/10.14722/ndss.2021.24078

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free