You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A curated collection of academic papers covering the intersection of WebAssembly and security from memory safety and sandboxing to malware detection, formal verification, program analysis, dataset generation and side-channel attacks.
WebAssembly (Wasm) is a production runtime powering some of the world's most critical applications - Photoshop, Figma, AutoCAD, Google Earth, Cloudflare Workers, Zoom, and many more. Its promise of near-native performance in a portable, sandboxed format has driven rapid adoption across browsers, edge computing, IoT, and serverless platforms.
Despite its sandboxing design, WebAssembly introduces a range of security concerns like memory corruption from C/C++ source, cryptojacking, malware obfuscation, Spectre-style side channels, runtime bugs, and the absence of default mitigations like stack canaries or ASLR.
This repository tracks academic research addressing these challenges. All papers have been manually reviewed and selected based on direct relevance to WebAssembly security.
All paper entries were imported manually. I apologize if any paper has been misrepresented. Please raise an issue or use the form above to report mistakes.