A new method to protect WebAssembly against Spectre attacks

hack attack
Credit: Pixabay/CC0 Public Domain

Computer scientists have developed a new compiler framework, called Swivel, to protect WebAssembly, or Warm, against Spectre attacks—the class of execution attacks, which exploit the way processors predict the computations that need to happen next. The team will present its research at the USENIX Security Symposium taking place Aug. 11 to 13, 2021. 

Wasm is an instruction set that has increasingly been used to sandbox untrusted code outside the browser. But unfortunately, Spectre attacks can bypass Wasm's isolation guarantees. To prevent this, Swivel ensures that potentially malicious code can neither use Spectre attacks to break out of the Wasm sandox pr force another Wasm client or the embedding process itself to leak secret data. 

Swivel does this via two different approaches: a -only approach that can be used on existing CPUs; and a -assisted approach that uses extensions available in Intel 11th-generation CPUs.

Explore further

Reports: Intel chips have new security flaws

More information: Full paper: www.usenix.org/system/files/sec21fall-narayan.pdf
Citation: A new method to protect WebAssembly against Spectre attacks (2021, August 11) retrieved 19 May 2022 from https://techxplore.com/news/2021-08-method-webassembly-spectre.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Feedback to editors