CROW: Code Diversification for WebAssembly

08/17/2020
by   Javier Cabrera-Arteaga, et al.
0

The adoption of WebAssembly has rapidly increased in the last few years as it provides a fast and safe model for program execution. However, WebAssembly is not exempt from vulnerabilities that could be exploited by side channels attacks. This class of vulnerabilities that can be addressed by code diversification. In this paper, we present the first fully automated workflow for the diversification of WebAssembly binaries. We present CROW, an open-source tool implementing this workflow. We evaluate CROW's capabilities on 303 C programs and study its use on a real-life security-sensitive program: libsodium, a cryptographic library. Overall, CROWis able to generate diverse variants for 239 out of 303,(79 show that our approach and tool is able to successfully diversify off-the-shelf cryptographic software (libsodium).

READ FULL TEXT

page 9

page 10

research
09/03/2021

Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly

This paper explores the use of relational symbolic execution to counter ...
research
05/17/2023

Automatic and Incremental Repair for Speculative Information Leaks

We present CureSpec, the first model-checking based framework for automa...
research
03/07/2019

Compositional Fuzzing Aided by Targeted Symbolic Execution

Guided fuzzing has, in recent years, been able to uncover many new vulne...
research
05/13/2020

A Generating-Extension-Generator for Machine Code

The problem of "debloating" programs for security and performance purpos...
research
08/31/2022

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications

Secret-dependent timing behavior in cryptographic implementations has re...
research
05/26/2023

Automated Verification of Correctness for Masked Arithmetic Programs

Masking is a widely-used effective countermeasure against power side-cha...
research
06/03/2021

Optimistic Concurrency Control for Real-world Go Programs (Extended Version with Appendix)

We present a source-to-source transformation framework, GOCC, that consu...

Please sign up or login with your details

Forgot password? Click here to reset