Skip to main content

Showing 1–4 of 4 results for author: Stiévenart, Q

  1. Wasmizer: Curating WebAssembly-driven Projects on GitHub

    Authors: Alexander Nicholson, Quentin Stiévenart, Arash Mazidi, Mohammad Ghafari

    Abstract: WebAssembly has attracted great attention as a portable compilation target for programming languages. To facilitate in-depth studies about this technology, we have deployed Wasmizer, a tool that regularly mines GitHub projects and makes an up-to-date dataset of WebAssembly sources and their binaries publicly available. Presently, we have collected 2 540 C and C++ projects that are highly-related t… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: 11 pages + 1 page of references Preprint of MSR'23 publication

  2. arXiv:2208.00258  [pdf

    cs.CR cs.SE

    Developers Struggle with Authentication in Blazor WebAssembly

    Authors: Pascal Marc André, Quentin Stiévenart, Mohammad Ghafari

    Abstract: WebAssembly is a growing technology to build cross-platform applications. We aim to understand the security issues that developers encounter when adopting WebAssembly. We mined WebAssembly questions on Stack Overflow and identified 359 security-related posts. We classified these posts into 8 themes, reflecting developer intentions, and 19 topics, representing developer issues in this domain. We fo… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: ICSME 2022: 38th IEEE International Conference on Software Maintenance and Evolution

  3. Security Risks of Porting C Programs to WebAssembly

    Authors: Quentin Stiévenart, Coen De Roover, Mohammad Ghafari

    Abstract: WebAssembly is a compilation target for cross-platform applications that is increasingly being used. In this paper, we investigate whether one can transparently cross-compile C programs to WebAssembly, and if not, what impact porting can have on their security. We compile 17,802 programs that exhibit common vulnerabilities to 64-bit x86 and to WebAssembly binaries, and we observe that the executio… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: The 37th ACM/SIGAPP Symposium on Applied Computing (SAC'22), 2022. arXiv admin note: text overlap with arXiv:2111.01421

  4. arXiv:2111.01421  [pdf

    cs.CR cs.PL

    The Security Risk of Lacking Compiler Protection in WebAssembly

    Authors: Quentin Stiévenart, Coen De Roover, Mohammad Ghafari

    Abstract: WebAssembly is increasingly used as the compilation target for cross-platform applications. In this paper, we investigate whether one can rely on the security measures enforced by existing C compilers when compiling C programs to WebAssembly. We compiled 4,469 C programs with known buffer overflow vulnerabilities to x86 code and to WebAssembly, and observed the outcome of the execution of the gene… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)