SlideShare a Scribd company logo
WebAssembly
A New World Of Native Exploits On The Web
Agenda
• Introduction
• The WebAssembly Platform
• Emscripten
• Possible Exploit Scenarios
• Conclusion
Wasm: What is it good for?
● Archive.org web emulators
● Image/processing
● Video Games
● 3D Modeling
● Cryptography Libraries
● Desktop Application Ports
Wasm: Crazy Incoming
● Browsix, jslinux
● Runtime.js (Node), Nebulet
● Cervus
● eWASM
Java Applet Joke Slide
● Sandboxed
● Virtual Machine, runs its own instruction set
● Runs in your browser
● Write once, run anywhere
● In the future, will be embedded in other targets
What Is WebAssembly?
● A relatively small set of low-level instructions
○ Instructions are executed by browsers
● Native code can be compiled into WebAssembly
○ Allows web developers to take their native C/C++ code to the browser
■ Or Rust, or Go, or anything else that can compile to Wasm
○ Improved Performance Over JavaScript
● Already widely supported in the latest versions of all major browsers
○ Not limited to running in browsers, Wasm could be anywhere
Wasm: A Stack Machine
Text Format Example
Linear Memory Model
Subtitle
Function Pointers
Wasm in the Browser
● Wasm doesn’t have access to memory, DOM, etc.
● Wasm functions can be exported to be callable from JS
● JS functions can be imported into Wasm
● Wasm’s linear memory is a JS resizable ArrayBuffer
● Memory can be shared across instances of Wasm
● Tables are accessible via JS, or can be shared to other instances of Wasm
Demo: Wasm in a nutshell
Emscripten
● Emscripten is an SDK that compiles C/C++ into .wasm binaries
● LLVM/Clang derivative
● Includes built-in C libraries, etc.
● Also produces JS and HTML code to allow easy integration into a site.
Old Exploits
Old Exploits: Integer Overflow
● Int overflows within the C code work as normal
○ Can be a gateway to other exploits or just a simple sign flip
● More interesting: JS numbers and C types and Wasm
○ Wasm: int32, int64, float32, float64
○ JS: 253
-1 (or sometimes 232
-1)
○ C: more than I can fit on this slide
Old Exploits
Integer Overflow
Demo
Old Exploits: Format String
● Right way: printf(“%s”,userstring)
● Wrong way: printf(userstring)
● Extra format specifiers appear to be pulling values from linear memory
● %n works fine, so we can write too!
● TODO
Old Exploits
Format String
Demo
Old Exploits: Buffer Overflows
● Good
○ C doesn’t do bounds checking, so neither does Wasm
○ Overflows can overwrite interesting values
■ Change a privilege level, account balance, etc.
● Bad
○ If you overflow past your linear memory, you get a JS error
○ Function structure of Wasm means no call stack as we know it, no
return pointers to overwrite, etc.
● Ugly
Old Exploits
BOF
Demo
Old Exploits: Et Cetera
● Probably working vulns/exploits/techniques:
○ TOC/TOU
○ Timing/side channels
○ Race conditions
○ Heap-based arbitrary writes
● Probably doesn’t work
○ UAF, null dereferencing, etc.
○ Classic buffer overflows, ROP
○ Information Leaks
New Exploits
New Exploit: BOF -> XSS
● If a value exposed to Wasm is later reflected back to JS, and there’s a
traditional buffer overflow, we should be able to overwrite the reflected value
○ We use a user-tainted value to overwrite a “safe” value
○ DOM-based XSS
○ Depends on what types of variables and how they were declared
● Likely to not be caught by any standard XSS scanners, since they won’t see
the reflected value as editable
● BONUS: JS has control of the Wasm memory, tables, and instructions, so
XSS also gives us control of any running Wasm if needed.
Emscripten: New Exploits
Buffer Overflow -> XSS
New Exploit: FP Overflow
● Function pointers aren’t really “pointers” in the C sense
● Variables will store indexes to the function table
● Wasm code will say “grab the index from that variable, then call that function”
● We’ve already shown we can modify the values of some variables via
overflows
● Can you see where this is going?
New Exploit: FP Overflow (2)
● Almost ROP?
○ Find functions you’d really like to call, but can’t, overflow the function
pointers somewhere else to point to those functions
○ Bad news: Signatures much match
■ Silver lining: There are only 4 types in Wasm
● Look for useful functions within the context of the application
○ “transferMoney”, “changePW”, etc.
○ Or, just look for something that lets you run JS (maybe builtin!)
● Similar technique described by Jonathan Foote at Fastly (his is
TC/Serialization-related)
Demo:FP Overwrite -> XSS
New Exploit: Server-side RCE
● All of the previous techniques can also be used against Node
● Remote Code Execution on the server
Demo:FP Overwrite -> RCE
Emscripten: Security Features
● Things that don’t matter:
○ Non-executable Memory (NX/DEP)
○ Stack Canaries
● Protections not present:
○ Address Space Layout Randomization (ASLR)
○ Library hardening (e.g. %n in format strings)
● Effective Mitigations:
○ Control Flow Integrity (CFI)
○ Function definitions and indexing (prevents ROP-style gadgets)
Application Developers
● Avoid emscripten_run_script and friends
● Run the optimizer
○ This removes automatically included functions that might have been
useful for control flow attacks
● Use Control Flow Integrity
○ There is a performance penalty
● Fix your c bugs!
Attackers
● Look for emscripten_run_script and friends
● Use overflows or other write attacks to modify Wasm data
○ Possible XSS, can also modify the Wasm itself
○ Even if XSS is not possible, can still modify data or make arbitrary
function calls in some cases
● Using these same tricks vs. Node -> RCE
More Information
Whitepaper: Security Chasms of WASM
- Tyler Lukasiewicz
- Brian McFadden
- Justin Engler
Justin Engler
justin.engler@nccgroup.trust
@justinengler
Tyler Lukasiewicz
Tyler.Lukasiewicz@nccgroup.trust
@_kablaa

More Related Content

What's hot (20)

PDF
Node.js for Rubists
Sagiv Ofek
 
PDF
2013 - Brian Stanley - Memcached, Cached all the things
PHP Conference Argentina
 
PDF
Scala e xchange 2013 haoyi li on metascala a tiny diy jvm
Skills Matter
 
ODP
Neosnippet.vim + Deoppet.nvim in Vim conf 2017
Shougo
 
KEY
CPAN Gems From The Far East
lestrrat
 
PPTX
zeromq
Rajan Bhatt
 
PDF
Zmq in context of openstack
Yatin Kumbhare
 
PDF
ZeroMQ - Sockets on steroids!
Pedro Januário
 
ODP
Javascript debugging
audiodog
 
KEY
Europycon2011: Implementing distributed application using ZeroMQ
fcrippa
 
PDF
Vb script tutorial for qtp[1]
srikanthbkm
 
PPTX
Making Symfony Services async with RabbitMq (and more Symfony)
Gaetano Giunta
 
ODP
MongoDB and Node.js
Dave Edelhart
 
PDF
Vim conf2019
Shougo
 
PDF
deoplete: The dark powered auto completion plugin for neovim
Shougo
 
PPTX
Coroutines in Kotlin
Jemo Mgebrishvili
 
PPTX
Ruby Blocks
Sarah Allen
 
PDF
2019 PHP Serbia - Boosting your performance with Blackfire
Marko Mitranić
 
PDF
Let's talk about neovim
Shougo
 
PDF
ekbpy'2012 - Антон Патрушев - ZeroMQ
it-people
 
Node.js for Rubists
Sagiv Ofek
 
2013 - Brian Stanley - Memcached, Cached all the things
PHP Conference Argentina
 
Scala e xchange 2013 haoyi li on metascala a tiny diy jvm
Skills Matter
 
Neosnippet.vim + Deoppet.nvim in Vim conf 2017
Shougo
 
CPAN Gems From The Far East
lestrrat
 
zeromq
Rajan Bhatt
 
Zmq in context of openstack
Yatin Kumbhare
 
ZeroMQ - Sockets on steroids!
Pedro Januário
 
Javascript debugging
audiodog
 
Europycon2011: Implementing distributed application using ZeroMQ
fcrippa
 
Vb script tutorial for qtp[1]
srikanthbkm
 
Making Symfony Services async with RabbitMq (and more Symfony)
Gaetano Giunta
 
MongoDB and Node.js
Dave Edelhart
 
Vim conf2019
Shougo
 
deoplete: The dark powered auto completion plugin for neovim
Shougo
 
Coroutines in Kotlin
Jemo Mgebrishvili
 
Ruby Blocks
Sarah Allen
 
2019 PHP Serbia - Boosting your performance with Blackfire
Marko Mitranić
 
Let's talk about neovim
Shougo
 
ekbpy'2012 - Антон Патрушев - ZeroMQ
it-people
 

Similar to WebAssembly: A New World of Native Exploits on the Browser (20)

PDF
Browser exploitation SEC-T 2019 stockholm
Jameel Nabbo
 
PDF
Web (dis)assembly
Shakacon
 
PPTX
WebAssembly: In a Nutshell
RangHo Lee
 
PPTX
WebAssembly WASM Introduction Presentation
Brad Beiermann
 
PDF
Boyan Mihaylov - Is web assembly the killer of javascript
Codemotion
 
PDF
Is WebAssembly the killer of JavaScript?
Boyan Mihaylov
 
PDF
Node Security: The Good, Bad & Ugly
Bishan Singh
 
PDF
DEF CON 27- JACK BAKER - web assembly games
Felipe Prado
 
PPT
Web assembly overview by Mikhail Sorokovsky
Valeriia Maliarenko
 
PDF
Web Assembly
Valerio Como
 
PDF
Exploitation and State Machines
Michael Scovetta
 
PPTX
Web assembly: a brief overview
Pavlo Iatsiuk
 
PPTX
WebAssembly overview. KievJS meetup
Alexandr Skachkov
 
PDF
Wasm intro
Elifarley Cruz
 
PPT
Writing Metasploit Plugins
amiable_indian
 
PDF
AllBits presentation - Lower Level SW Security
AllBits BVBA (freelancer)
 
PDF
WebAssembly & Zero Trust for Code
All Things Open
 
ODP
An Introduction to WebAssembly
Daniel Budden
 
PPTX
Web assembly - Future of the Web
CodeValue
 
PDF
Always bet on JS - Finjs.io NYC 2016
Brendan Eich
 
Browser exploitation SEC-T 2019 stockholm
Jameel Nabbo
 
Web (dis)assembly
Shakacon
 
WebAssembly: In a Nutshell
RangHo Lee
 
WebAssembly WASM Introduction Presentation
Brad Beiermann
 
Boyan Mihaylov - Is web assembly the killer of javascript
Codemotion
 
Is WebAssembly the killer of JavaScript?
Boyan Mihaylov
 
Node Security: The Good, Bad & Ugly
Bishan Singh
 
DEF CON 27- JACK BAKER - web assembly games
Felipe Prado
 
Web assembly overview by Mikhail Sorokovsky
Valeriia Maliarenko
 
Web Assembly
Valerio Como
 
Exploitation and State Machines
Michael Scovetta
 
Web assembly: a brief overview
Pavlo Iatsiuk
 
WebAssembly overview. KievJS meetup
Alexandr Skachkov
 
Wasm intro
Elifarley Cruz
 
Writing Metasploit Plugins
amiable_indian
 
AllBits presentation - Lower Level SW Security
AllBits BVBA (freelancer)
 
WebAssembly & Zero Trust for Code
All Things Open
 
An Introduction to WebAssembly
Daniel Budden
 
Web assembly - Future of the Web
CodeValue
 
Always bet on JS - Finjs.io NYC 2016
Brendan Eich
 
Ad

More from Priyanka Aash (20)

PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
PDF
Keynote : Presentation on SASE Technology
Priyanka Aash
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
PDF
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
PDF
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
Ad

Recently uploaded (20)

PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
Q2 Leading a Tableau User Group - Onboarding
lward7
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Q2 Leading a Tableau User Group - Onboarding
lward7
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 

WebAssembly: A New World of Native Exploits on the Browser

  • 1. WebAssembly A New World Of Native Exploits On The Web
  • 2. Agenda • Introduction • The WebAssembly Platform • Emscripten • Possible Exploit Scenarios • Conclusion
  • 3. Wasm: What is it good for? ● Archive.org web emulators ● Image/processing ● Video Games ● 3D Modeling ● Cryptography Libraries ● Desktop Application Ports
  • 4. Wasm: Crazy Incoming ● Browsix, jslinux ● Runtime.js (Node), Nebulet ● Cervus ● eWASM
  • 5. Java Applet Joke Slide ● Sandboxed ● Virtual Machine, runs its own instruction set ● Runs in your browser ● Write once, run anywhere ● In the future, will be embedded in other targets
  • 6. What Is WebAssembly? ● A relatively small set of low-level instructions ○ Instructions are executed by browsers ● Native code can be compiled into WebAssembly ○ Allows web developers to take their native C/C++ code to the browser ■ Or Rust, or Go, or anything else that can compile to Wasm ○ Improved Performance Over JavaScript ● Already widely supported in the latest versions of all major browsers ○ Not limited to running in browsers, Wasm could be anywhere
  • 7. Wasm: A Stack Machine
  • 11. Wasm in the Browser ● Wasm doesn’t have access to memory, DOM, etc. ● Wasm functions can be exported to be callable from JS ● JS functions can be imported into Wasm ● Wasm’s linear memory is a JS resizable ArrayBuffer ● Memory can be shared across instances of Wasm ● Tables are accessible via JS, or can be shared to other instances of Wasm
  • 12. Demo: Wasm in a nutshell
  • 13. Emscripten ● Emscripten is an SDK that compiles C/C++ into .wasm binaries ● LLVM/Clang derivative ● Includes built-in C libraries, etc. ● Also produces JS and HTML code to allow easy integration into a site.
  • 15. Old Exploits: Integer Overflow ● Int overflows within the C code work as normal ○ Can be a gateway to other exploits or just a simple sign flip ● More interesting: JS numbers and C types and Wasm ○ Wasm: int32, int64, float32, float64 ○ JS: 253 -1 (or sometimes 232 -1) ○ C: more than I can fit on this slide
  • 17. Old Exploits: Format String ● Right way: printf(“%s”,userstring) ● Wrong way: printf(userstring) ● Extra format specifiers appear to be pulling values from linear memory ● %n works fine, so we can write too! ● TODO
  • 19. Old Exploits: Buffer Overflows ● Good ○ C doesn’t do bounds checking, so neither does Wasm ○ Overflows can overwrite interesting values ■ Change a privilege level, account balance, etc. ● Bad ○ If you overflow past your linear memory, you get a JS error ○ Function structure of Wasm means no call stack as we know it, no return pointers to overwrite, etc. ● Ugly
  • 21. Old Exploits: Et Cetera ● Probably working vulns/exploits/techniques: ○ TOC/TOU ○ Timing/side channels ○ Race conditions ○ Heap-based arbitrary writes ● Probably doesn’t work ○ UAF, null dereferencing, etc. ○ Classic buffer overflows, ROP ○ Information Leaks
  • 23. New Exploit: BOF -> XSS ● If a value exposed to Wasm is later reflected back to JS, and there’s a traditional buffer overflow, we should be able to overwrite the reflected value ○ We use a user-tainted value to overwrite a “safe” value ○ DOM-based XSS ○ Depends on what types of variables and how they were declared ● Likely to not be caught by any standard XSS scanners, since they won’t see the reflected value as editable ● BONUS: JS has control of the Wasm memory, tables, and instructions, so XSS also gives us control of any running Wasm if needed.
  • 25. New Exploit: FP Overflow ● Function pointers aren’t really “pointers” in the C sense ● Variables will store indexes to the function table ● Wasm code will say “grab the index from that variable, then call that function” ● We’ve already shown we can modify the values of some variables via overflows ● Can you see where this is going?
  • 26. New Exploit: FP Overflow (2) ● Almost ROP? ○ Find functions you’d really like to call, but can’t, overflow the function pointers somewhere else to point to those functions ○ Bad news: Signatures much match ■ Silver lining: There are only 4 types in Wasm ● Look for useful functions within the context of the application ○ “transferMoney”, “changePW”, etc. ○ Or, just look for something that lets you run JS (maybe builtin!) ● Similar technique described by Jonathan Foote at Fastly (his is TC/Serialization-related)
  • 28. New Exploit: Server-side RCE ● All of the previous techniques can also be used against Node ● Remote Code Execution on the server
  • 30. Emscripten: Security Features ● Things that don’t matter: ○ Non-executable Memory (NX/DEP) ○ Stack Canaries ● Protections not present: ○ Address Space Layout Randomization (ASLR) ○ Library hardening (e.g. %n in format strings) ● Effective Mitigations: ○ Control Flow Integrity (CFI) ○ Function definitions and indexing (prevents ROP-style gadgets)
  • 31. Application Developers ● Avoid emscripten_run_script and friends ● Run the optimizer ○ This removes automatically included functions that might have been useful for control flow attacks ● Use Control Flow Integrity ○ There is a performance penalty ● Fix your c bugs!
  • 32. Attackers ● Look for emscripten_run_script and friends ● Use overflows or other write attacks to modify Wasm data ○ Possible XSS, can also modify the Wasm itself ○ Even if XSS is not possible, can still modify data or make arbitrary function calls in some cases ● Using these same tricks vs. Node -> RCE
  • 33. More Information Whitepaper: Security Chasms of WASM - Tyler Lukasiewicz - Brian McFadden - Justin Engler Justin Engler [email protected] @justinengler Tyler Lukasiewicz [email protected] @_kablaa