Loading…
REGISTRATION IS NOW 
Conference Venue: RAI Amsterdam, Europaplein 24, 1078 GZ Amsterdam, The Netherlands

Book Hotel click HERE
Back To Schedule
Thursday, September 26 • 2:35pm - 3:20pm
The Now and the Future of Malicious WebAssembly

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
WebAssembly, or Wasm for short, is a new, low-level language that allows for near-native execution performance and is supported by all major browsers as of today. In comparison to JavaScript it offers faster transmission, parsing, and execution times. Up until now it has, however, been largely unclear what WebAssembly is used for in the wild. In this talk, we examine the prevalence of WebAssembly in the Alexa Top 1 million websites and find that as many as 1 out of 600 sites execute Wasm code. By manually analyzing all collected Wasm modules we find that over 50% of all sites using WebAssembly apply it for malicious deeds. The main use for mining cryptocurrencies in the browser, however we also discovered several sites that use Wasm to obfuscate their code. The talk concludes with the potential future of malicious WebAssembly defense mechanisms are affected.

Speakers
avatar for Marius Musch

Marius Musch

Marius Musch is a PhD candidate at the Insitute for Application Security at TU Braunschweig in Germany. His field of research is web application security with a focus on client-side attacks and large-scale analyses.


Thursday September 26, 2019 2:35pm - 3:20pm CEST
D203