TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly

نویسندگان

  • William Fu
  • Raymond Lin
  • Daniel Inge
چکیده

WebAssembly (wasm) has recently emerged as a promisingly portable, size-efficient, fast, and safe binary format for the web. As WebAssembly can interact freely with JavaScript libraries, this gives rise to a potential for undesirable behavior to occur. It is therefore important to be able to detect when this might happen. A way to do this is through taint tracking, where we follow the flow of information by applying taint labels to data. In this paper, we describe TaintAssembly, a taint tracking engine for interpreted WebAssembly, that we have created by modifying the V8 JavaScript engine. We implement basic taint tracking functionality, taint in linear memory, and a probabilistic variant of taint. We then benchmark our TaintAssembly engine by incorporating it into a Chromium build and running it on custom test scripts and various real world WebAssembly applications. We find that our modifications to the V8 engine do not incur significant overhead with respect to vanilla V8’s interpreted WebAssembly, making TaintAssembly suitable for development and debugging. Keywords—WebAssembly, Taint Tracking, V8, Chromium

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks

Memory corruption attacks remain the primary threat for computer security. Information flow tracking or taint analysis has been proven to be effective against most memory corruption attacks. However, there are two shortcomings with current taint analysis based techniques. First, these techniques cause application slowdown by about 76% thereby limiting their practicality. Second, these technique...

متن کامل

A Hybrid System Approach to Model Dynamic Information Flow Tracking

Control theory is used in several disciplines such as mechanical engineering, communication, and computer engineering. This paper examines the application of control theory to computer security, specifically in the area of Dynamic Information Flow Tracking (DIFT). Control theory can be used to model the destruction of information in DIFT. The DIFT system examined in this paper utilizes a taint ...

متن کامل

GPU Taint Tracking

Dynamic tainting tracks the influence of certain inputs (taint sources) through execution and it is a powerful tool for information flow analysis and security. Taint tracking has primarily targeted CPU program executions. Motivated by recent recognition of information leaking in GPU memory and GPU-resident malware, this paper presents the first design and prototype implementation of a taint tra...

متن کامل

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation

Dynamic taint analysis (DTA) is a powerful technique for, among other things, tracking the flow of sensitive information. However, it is vulnerable to false negative errors caused by implicit flows, situations in which tainted data values affect control flow, which in turn affects other data. We propose DTA++, an enhancement to dynamic taint analysis that additionally propagates taint along a t...

متن کامل

LazyTainter : Memory - Efficient Taint Tracking in Managed Runtimes

LazyTainter : Memory-Efficient Taint Tracking in Managed Runtimes Zheng Wei Master of Science Graduate Department of Computer Science University of Toronto 2014 The leakage of private information is of great concern on mobile devices since they contain a great deal of sensitive information. This has spurred interest in the use of taint tracking systems to track and monitor the flow of private i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1802.01050  شماره 

صفحات  -

تاریخ انتشار 2018