Title:

Web Assembly: Stack Buffer Overflow

Poster

Preview Converted Images may contain errors

Abstract

The digital world is constantly evolving with new technologies being introduced as well as current ones being improved on. This fast passed and evolving environment brings a multitude of risks with each development made. A prime example of this is Web Assembly a new programming language that was recent introduced into the digital world. Web Assembly also called WASM was designed to enable code written in different languages to run at near native speeds. This would allow for fast and efficient interactions between web applications and the user. However, eventually this new technology would turn into a major security issue. As web assembly became more popular exploits started to be discovered, these exploits stem from the layout of web assembly's memory. Do to the linear layout of web assembly's memory it allows malicious actors to perform harmful actions more efficiently. The different forms these malicious actors can conduct these harmful actions varies but one of the most popular forms is through a stack buffer overflow vulnerability.

Authors

First Name Last Name
Lex King

File Count: 1


Leave a comment

Comments are viewable only by submitter



Submission Details

Conference URC
Event Interdisciplinary Science and Engineering (ISE)
Department Computer Science (ISE)
Group Systems
Added April 18, 2024, 3:26 p.m.
Updated April 18, 2024, 4:31 p.m.
See More Department Presentations Here