An Empirical Study of Real-World WebAssembly Binaries Security, Languages, Use Cases

被引:39
|
作者
Hilbig, Aaron [1 ]
Lehmann, Daniel [1 ]
Pradel, Michael [1 ]
机构
[1] Univ Stuttgart, Stuttgart, Germany
基金
欧洲研究理事会;
关键词
D O I
10.1145/3442381.3450138
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
WebAssembly has emerged as a low-level language for the web and beyond. Despite its popularity in different domains, little is known about WebAssembly binaries that occur in the wild. This paper presents a comprehensive empirical study of 8,461 unique WebAssembly binaries gathered from a wide range of sources, including source code repositories, package managers, and live websites. We study the security properties, source languages, and use cases of the binaries and how they influence the security of the WebAssembly ecosystem. Our findings update some previously held assumptions about real-world WebAssembly and highlight problems that call for future research. For example, we show that vulnerabilities that propagate from insecure source languages potentially affect a wide range of binaries (e.g., two thirds of the binaries are compiled from memory unsafe languages, such as C and C++) and that 21% of all binaries import potentially dangerous APIs from their host environment. We also show that cryptomining, which once accounted for the majority of all WebAssembly code, has been marginalized (less than 1% of all binaries found on the web) and gives way to a diverse set of use cases. Finally, 29% of all binaries on the web are minified, calling for techniques to decompile and reverse engineer WebAssembly. Overall, our results show that WebAssembly has left its infancy and is growing up into a language that powers a diverse ecosystem, with new challenges and opportunities for security researchers and practitioners. Besides these insights, we also share the dataset underlying our study, which is 58 times larger than the largest previously reported benchmark.
引用
收藏
页码:2696 / 2708
页数:13
相关论文
共 50 条
  • [1] Quantum communications for real-world use cases
    Francesconi, Saverio
    Ribezzo, Domenico
    Biagi, Nicola
    Vagniluca, Ilaria
    De Lazzari, Claudia
    Occhipinti, Tommaso
    Bacco, Davide
    Zavatta, Alessandro
    2024 24TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, ICTON 2024, 2024,
  • [2] WHAT USE ARE REAL-WORLD CASES FOR PHILOSOPHERS?
    Furman, Katherine
    ERGO-AN OPEN ACCESS JOURNAL OF PHILOSOPHY, 2021, 7 : 441 - 456
  • [3] Real-World Study Real-World Study of the Use of Azacitidine in Myelodysplasia in Australia
    Enjeti, Anoop
    Ashraf, Asma
    Caillet, Vincent
    Alam, Arif
    Sillar, Jonathan Robert
    Castaldi, Francesco
    Paine, Taliesha
    Keer, Harold N.
    BLOOD, 2022, 140 : 12341 - 12342
  • [4] Real-World Security Protocols
    Hao, Feng
    IEEE SECURITY & PRIVACY, 2024, 22 (06) : 9 - 10
  • [5] Real-world study: from real-world data to real-world evidence
    Wen, Yi
    TRANSLATIONAL BREAST CANCER RESEARCH, 2020, 1
  • [6] The impact of Use Cases in real-world software development projects: A systematic mapping study
    Barros-Justo, Jose L.
    Benitti, Fabiane B. V.
    Tiwari, Saurabh
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [7] Hercules: Reproducing Crashes in Real-World Application Binaries
    Van-Thuan Pham
    Ng, Wei Boon
    Rubinov, Konstantin
    Roychoudhury, Abhik
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 891 - 901
  • [8] An Empirical Study of Information Flows in Real-World Java']JavaScript
    Staicu, Cristian-Alexandru
    Schoepe, Daniel
    Balliu, Musard
    Pradel, Michael
    Sabelfeld, Andrei
    PROCEEDINGS OF THE 14TH ACM SIGSAC WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS '19), 2019, : 45 - 59
  • [10] A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective
    Parkinson, Simon
    Khan, Saad
    ACM COMPUTING SURVEYS, 2023, 55 (06)