2022
DOI: 10.1145/3498688
|View full text |Cite
|
Sign up to set email alerts
|

Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI

Abstract: Software sandboxing or software-based fault isolation (SFI) is a lightweight approach to building secure systems out of untrusted components. Mozilla, for example, uses SFI to harden the Firefox browser by sandboxing third-party libraries, and companies like Fastly and Cloudflare use SFI to safely co-locate untrusted tenants on their edge clouds. While there have been significant efforts to optimize and verify SFI enforcement, context switching in SFI systems remains largely unexplored: almost all SFI systems … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…A formally verified sandboxing compiler for WASM has been implemented to strengthen WASM binary compilation [56]. Moreover, several verification methodologies for SFI-compliance in WASM are also proposed [12], [57]. AGORA's assertion generator for a WASM SFI policy is built on top of their artifact.…”
Section: Related Workmentioning
confidence: 99%
“…A formally verified sandboxing compiler for WASM has been implemented to strengthen WASM binary compilation [56]. Moreover, several verification methodologies for SFI-compliance in WASM are also proposed [12], [57]. AGORA's assertion generator for a WASM SFI policy is built on top of their artifact.…”
Section: Related Workmentioning
confidence: 99%
“…Despite not trusting the WebApp, transitions from the WebApp to CryptoLib can elide context switching required for register isolation under a specific condition. Verification approaches [30], [31] can be used to prove that a small function in CryptoLib does not leak the key under the assumption that entry points are enforced, and that the function's code overwrites registers used to store the key before returning to the WebApp. By using the cheaper migrating thread model [32], a security-proportional mechanism can reduce overheads where acceptable.…”
Section: Flexibilitymentioning
confidence: 99%