Dear all,
I would like to inform you that the following paper
Concolic Execution for WebAssembly
Filipe Marques, José Fragoso Santos, Nuno Santos, and Pedro Adão
will be published in the conference (core-A ranking)
ECOOP2022, Mon 6 - Fri 10 June 2022 Berlin, Germany
https://2022.ecoop.org/
and will acknowledge SPARTA.
I will make the paper available as soon as we have the camera ready version.
Attach the current draft.
Best regards,
Pedro
Abstract:
WebAssembly (Wasm) is a new binary instruction format that allows targeted compiled code
written in high-level languages to be executed by the browser's JavaScript engine with
near-native speed. Despite its clear performance advantages, Wasm opens up the opportunity
for bugs or security vulnerabilities to be introduced into Web programs, as pre-existing
issues in programs written in unsafe languages can be transferred down to cross-compiled
binaries. The source code of such binaries is frequently unavailable for static analysis,
creating the demand for tools that can directly tackle Wasm code. Despite this potentially
security-critical situation, there is still a noticeable lack of tool support for
analysing Wasm binaries.
We present WASP, a symbolic execution engine for testing Wasm modules, which works
directly on Wasm code and was built on top of a standard-compliant Wasm reference
implementation. WASP was thoroughly evaluated: it was used to symbolically test a generic
data-structure library for C and the Amazon Encryption SDK for C, demonstrating that it
can find bugs and generate high-coverage testing inputs for real-world C applications; and
was further tested against the Test-Comp benchmark, obtaining results comparable to
well-established symbolic execution and testing tools for C, such as KLEE and VeriFuzz.