2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2020
DOI: 10.1109/scam51674.2020.00007
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Information Flow Analysis for WebAssembly Programs

Abstract: General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 58 publications
0
15
0
Order By: Relevance
“…Static analysis can also help identify potential security risks in an application. Wassail [28] is a static analysis framework for WebAssembly that has been used to build an information flow analysis [27] in order to detect higher-level security concerns such as leaks of sensitive information.…”
Section: Hardening Webassemblymentioning
confidence: 99%
“…Static analysis can also help identify potential security risks in an application. Wassail [28] is a static analysis framework for WebAssembly that has been used to build an information flow analysis [27] in order to detect higher-level security concerns such as leaks of sensitive information.…”
Section: Hardening Webassemblymentioning
confidence: 99%
“…Johnson et al [33], on the other hand, propose fault isolation for WebAssembly binaries, a technique that can be applied before being deployed to the edge-cloud platforms. Stievenart et al [55] design a static analysis dedicated to information flow problems. Bian et al [14] performs runtime monitoring of WebAssembly to detect cryptojacking.…”
Section: Related Work On Webassembly Securitymentioning
confidence: 99%
“…Comparison against related systems: To put Wasmati's results in perspective, we compared it against the closest-related system in the literature named Wassail [35]. Wassail is a static taint analysis tool for WebAssembly programs focused exclusively on information flow analysis.…”
Section: Scalability Assessmentmentioning
confidence: 99%
“…Wasabi [23] is a general framework for instrumenting Wasm binaries and can be used to implement different types of dynamic analyzes. To the best of our knowledge, there are only three taint analysis tools for WebAssembly: TaintAssembly [14], the tool presented in [37], and Wassail [35], with the former two being dynamic and the latter static. Wassail implements a data flow analysis algorithm that has not been tailored for vulnerability detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation