Table of Contents
Fetching ...

Defending Buffer Overflows in WebAssembly: A Transpiler Approach

Weiqi Feng

Abstract

WebAssembly is quickly becoming a popular compilation target for a variety of code. However, vulnerabilities in the source languages translate to vulnerabilities in the WebAssembly binaries. This work proposes a methodology and a WebAssembly transpiler to prevent buffer overflows in the unmanaged memory of the WebAssembly runtime. The transpiler accepts a WebAssembly binary and adds stack canaries and Address Space Layout Randomization (ASLR) to protect against buffer overflows.

Defending Buffer Overflows in WebAssembly: A Transpiler Approach

Abstract

WebAssembly is quickly becoming a popular compilation target for a variety of code. However, vulnerabilities in the source languages translate to vulnerabilities in the WebAssembly binaries. This work proposes a methodology and a WebAssembly transpiler to prevent buffer overflows in the unmanaged memory of the WebAssembly runtime. The transpiler accepts a WebAssembly binary and adds stack canaries and Address Space Layout Randomization (ASLR) to protect against buffer overflows.

Paper Structure

This paper contains 35 sections, 2 equations, 1 figure, 1 table.

Figures (1)

  • Figure 1: Example of WebAssembly program in wat format