[HTML][HTML] WebAssembly and Security: a review

G Perrone, SP Romano - Computer Science Review, 2025 - Elsevier
WebAssembly is revolutionizing the approach to develo** modern applications. Although
this technology was born to create portable and performant modules in web browsers …

Research on WebAssembly Runtimes: A Survey

Y Zhang, M Liu, H Wang, Y Ma, G Huang… - ACM Transactions on …, 2024 - dl.acm.org
WebAssembly (abbreviated as Wasm) was initially introduced for the Web and quickly
extended its reach into various domains beyond the Web. To create Wasm applications …

Half&Half: Demystifying Intel's directional branch predictors for fast, secure partitioned execution

H Yavarzadeh, M Taram, S Narayan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
This paper presents Half&Half, a novel software defense against branch-based side-
channel attacks. Half&Half isolates the effects of different protection domains on the …

SoK: Software Compartmentalization

H Lefeuvre, N Dautenhahn, D Chisnall… - arxiv preprint arxiv …, 2024 - arxiv.org
Decomposing large systems into smaller components with limited privileges has long been
recognized as an effective means to minimize the impact of exploits. Despite historical roots …

Whose baseline compiler is it anyway?

BL Titzer - 2024 IEEE/ACM International Symposium on Code …, 2024 - ieeexplore.ieee.org
Compilers face an intrinsic tradeoff between compilation speed and code quality. The
tradeoff is particularly stark in a dynamic setting where JIT compilation time contributes to …

TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption

M Unterguggenberger, L Lamster, D Schrammel… - arxiv preprint arxiv …, 2024 - arxiv.org
Efficient cloud computing relies on in-process isolation to optimize performance by running
workloads within a single process. Without heavy-weight process isolation, memory safety …

Limitations and Opportunities of Modern Hardware Isolation Mechanisms

X Chen, Z Li, T Jain, V Narayanan… - 2024 USENIX Annual …, 2024 - usenix.org
A surge in the number, complexity, and automation of targeted security attacks has triggered
a wave of interest in hardware support for isolation. Intel memory protection keys (MPK) …

G-Safe: Safe GPU Sharing in Multi-Tenant Environments

M Pavlidakis, G Vasiliadis, S Mavridis… - arxiv preprint arxiv …, 2024 - arxiv.org
Modern GPU applications, such as machine learning (ML) frameworks, can only partially
utilize beefy GPUs, leading to GPU underutilization in cloud environments. Sharing GPUs …

RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes

J Park, Y Kim, I Yun - 2025 IEEE Symposium on Security and Privacy …, 2024 - computer.org
WebAssembly runtimes embed compilers to compile WebAssembly code into machine code
for execution. These compilers use various compiler rules to define how to optimize and …

SECOMP: Formally Secure Compilation of Compartmentalized C Programs

J Thibault, R Blanco, D Lee, S Argo… - Proceedings of the …, 2024 - dl.acm.org
Undefined behavior in C often causes devastating security vulnerabilities. One practical
mitigation is compartmentalization, which allows developers to structure large programs into …