Published November 19, 2024 | Version v1
Conference paper Open

Robust Stack Smashing Protection for WebAssembly

  • 1. Thales Group, Palaiseau, France
  • 2. SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, Palaiseau, France

Description

WebAssembly is an instruction set architecture and binary format standard, designed for secure execution by an interpreter. This technology is identified as an alternative for current containerization technologies that is suitable for secure and lightweight orchestration for 5G/6G environments. Previous work has shown that WebAssembly is vulnerable to buffer overflow due to the lack of effective protection mechanisms.

In this paper, we evaluate the implementation of Stack Smashing Protection (SSP) in WebAssembly standalone runtimes, and uncover two weaknesses in their current implementation. The first one is the possibility to overwrite the SSP reference value because of the contiguous memory zones inside a WebAssembly process. The second comes from the reliance of WebAssembly on the runtime to provide randomness in order to initialize the SSP reference value, which impacts the robustness of the solution.

We address these two flaws by hardening the SSP implementation in terms of storage and random generator failure, in a way that is generalizable to all of WebAssembly. We evaluate our new, more robust, solution to prove that the implemented improvements do not reduce the efficiency of SSP.

Files

Michaud_etal_FNWF2024.pdf

Files (432.8 kB)

Name Size Download all
md5:bb5b9be8f70830d830a7ddd37be57a05
432.8 kB Preview Download

Additional details

Funding

European Commission
ELASTIC – Efficient, portabLe And Secure orchesTration for reliable servICes 101139067