Security Risks of Porting C Programs to WebAssembly

Research output: Chapter in Book/Report/Conference proceedingConference paper

2 Citations (Scopus)
47 Downloads (Pure)

Abstract

WebAssembly is a compilation target for cross-platform applications that is increasingly being used. In this paper, we investigate whether one can transparently cross-compile C programs to WebAssembly, and if not, what impact porting can have on their security. We compile 17 802 programs that exhibit common vulnerabilities to 64-bit x86 and to WebAssembly binaries, and we observe that the execution of 4 911 binaries produces different results across these platforms. Through manual inspection, we identify three classes of root causes for such differences: the use of a different standard library implementation, the lack of security measures in WebAssembly, and the different semantics of the execution environments. We describe our observations and discuss the ones that are critical from a security point of view and need most attention from developers. We conclude that compiling an existing C program to WebAssembly for cross-platform distribution may require source code adaptations; otherwise, the security of the WebAssembly application may be at risk.

Original languageEnglish
Title of host publicationThe 37th ACM/SIGAPP Symposium On Applied Computing
PublisherACM
Pages1713-1722
Number of pages10
ISBN (Electronic)9781450387132
DOIs
Publication statusPublished - 2022
EventThe 37th ACM/SIGAPP Symposium On Applied Computing - Virtual
Duration: 25 Apr 202229 Apr 2022
https://www.sigapp.org/sac/sac2022/

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

ConferenceThe 37th ACM/SIGAPP Symposium On Applied Computing
Abbreviated titleSAC 2022
Period25/04/2229/04/22
Internet address

Fingerprint

Dive into the research topics of 'Security Risks of Porting C Programs to WebAssembly'. Together they form a unique fingerprint.

Cite this