Full Text

Turn on search term navigation

© 2024. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

WebAssembly (Wasm) has rapidly gained adoption as a powerful, low-level assembly language designed to enable near-native performance in web browsers, alongside secure execution in other environments such as loT and edge computing. Despite its secure-by-design nature, WebAssembly is vulnerable to several types of attacks, including memory safety issues, side-channel attacks, and code injection. These vulnerabilities pose significant threats to applications relying on WebAssembly, particularly in performancesensitive and security-critical environments. This study examines existing research on static, dynamic, and hybrid analysis approaches for discovering vulnerabilities in WebAssembly binaries. By categorizing state-of-the-art methods, are highlighted both their contributions and limitations. This study aims to foster a unified framework for vulnerability discovery that aligns with the needs of both WebAssembly applications and the broader cybersecurity landscape.

Details

Title
A REVIEW OF VULNERABILITY DISCOVERY IN WEBASSEMBLY BINARIES: INSIGHTS FROM STATIC, DYNAMIC, AND HYBRID ANALYSIS
Author
Ţălu, Mircea 1 

 The Technical University of Cluj-Napoca, Faculty of Automation and Computer Science, Cluj-Napoca, ROMANIA 
Pages
13-22
Publication year
2024
Publication date
Oct-Dec 2024
Publisher
Faculty of Engineering Hunedoara
e-ISSN
20673809
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3160113809
Copyright
© 2024. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.