Our new X account is live! Follow @wizwand_team for updates
WorkDL logo mark

Lost in the Pages: WebAssembly Code Recovery through SEV-SNP's Exposed Address Space

About

WebAssembly (Wasm) has risen as a widely used technology to distribute computing workloads on different platforms. The platform independence offered through Wasm makes it an attractive solution for many different applications that can run on disparate infrastructures. In addition, Trusted Execution Environments (TEEs) are offered in many computing infrastructures, which allows also running security sensitive Wasm workloads independent of the specific platforms offered. However, recent work has shown that Wasm binaries are more sensitive to code confidentiality attacks than native binaries. The previous result was obtained for Intel SGX only. In this paper, we take this one step further, introducing a new Wasm code-confidentiality attack that exploits exposed address-space information in TEEs. Our attack enables the extraction of crucial execution features which, when combined with additional side channels, allows us to with high reliability obtain more than 70% of the code in most cases. This is a considerably larger amount than was previously obtained by single stepping Intel SGX where only upwards to 50% of the code could be obtained.

Markus Berthilsson, Christian Gehrmann• 2025

Related benchmarks

TaskDatasetResultRank
Instruction RecoveryAES O0
Extracted Instructions1.32e+6
1
Instruction RecoveryAES O1
Extracted Instructions6.94e+4
1
Instruction RecoveryAES O2
Extracted Instructions4.44e+4
1
Instruction Recoveryprimes.wat
Extracted Instructions2.14e+5
1
Instruction RecoveryChess O0
Extracted Instructions Count8.57e+6
1
Instruction RecoveryChess O2
Extracted Instructions Count1.91e+6
1
Instruction RecoveryChess O3
Extracted Instructions1.27e+8
1
Showing 7 of 7 rows

Other info

Follow for update