A New Method To Protect WebAssembly Against Spectre Attacks (Computer Science)

Computer scientists have developed a new compiler framework, called Swivel, to protect WebAssembly, or Warm, against Spectre attacks—the class of execution attacks, which exploit the way processors predict the computations that need to happen next. The team will present its research at the USENIX Security Symposium taking place Aug. 11 to 13, 2021. 

Wasm is an instruction set that has increasingly been used to sandbox untrusted code outside the browser. But unfortunately, Spectre attacks can bypass Wasm’s isolation guarantees. To prevent this, Swivel ensures that potentially malicious code can neither use Spectre attacks to break out of the Wasm sandox pr force another Wasm client or the embedding process itself to leak secret data. 

Swivel does this via two different approaches: a software-only approach that can be used on existing CPUs; and a hardware-assisted approach that uses extensions available in Intel 11th-generation CPUs.

Full story: 

https://bit.ly/SWIVELUSENIX2021


Provided by University of California San Diego

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s