Тёмный
No video :(

Compromising the Security of WASM 

nanovms
Подписаться 397
Просмотров 149
50% 1

In this video we show three different methods for hacking and breaking the security of wasm programs.
We contrast/compare with Linux and the Nanos Unikernel and explain why these security controls are necessary and beneficial.
While unikernels and wasm are not mutually exclusive (you can run wasm runtimes inside of a unikernel) we caution the viewer about the security risks.

Опубликовано:

 

29 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@offlinemark
@offlinemark 3 месяца назад
awesome, love this technical content 👌
@almc8445
@almc8445 3 месяца назад
Isn’t the whole idea of WASM that it’s for client side code? In which case you should be assuming that “Read-Only” isn’t a thing that exists anyway. You always assume the client is compromised. This is an application design issue, if you need a value stored or calculated securely, it should be happening server-side anyway?
@nanovms7360
@nanovms7360 3 месяца назад
No. Quite a few companies/organizations are explicitly building for wasm on the server-side, in particular in the 'function-as-a-service' space there is quite a lot of attention to using wasm in this manner.
Далее
What Everyone Missed About The Linux Hack
20:24
Просмотров 285 тыс.
I forced EVERYONE to use Linux
22:59
Просмотров 476 тыс.
Why Linux Is Better For Programming
13:32
Просмотров 2,8 млн
The Truth about Rust/WebAssembly Performance
29:47
Просмотров 179 тыс.
CNIT 129S: Ch 6: Attacking Authentication
1:27:48
Просмотров 1,4 тыс.