This is the top-level companion software artifact repository for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly". The other repositories relevant to this artifact are locked to specific revisions using git submodules. To clone everything in one go, use:
git clone --recursive \
https://github.com/secure-foundations/provably-safe-sandboxing-wasm-usenix22
This repository also contains the files necessary to benchmark vWasm
and rWasm. See the README.md
files in the subdirectories
benchmarks/
,
microbenchmark-compare-read-arr/
,
and image-conversion-scenario/
for
more information. Plots produced from the raw output of the benchmarks
can be produced using the files in figures/
.
To find the latest versions of the submodules, rather than the fixed tags maintained for this software artifact, head over directly to the repositories:
- rWasm: a high-performance informally-verified provably-safe sandboxing compiler
- vWasm: a formally-verified provably-safe sandboxing compiler, built in F*
- wasm-semantics-fuzzer: a tool for providing greater assurance in the semantic correctness of any Wasm implementation
BSD 3-Clause License. See LICENSE.
Provably-Safe Multilingual Software Sandboxing using WebAssembly. Jay Bosamiya, Wen Shih Lim, and Bryan Parno. In Proceedings of the USENIX Security Symposium, August, 2022.
@inproceedings{provably-safe-sandboxing-wasm,
author = {Bosamiya, Jay and Lim, Wen Shih and Parno, Bryan},
booktitle = {Proceedings of the USENIX Security Symposium},
month = {August},
title = {Provably-Safe Multilingual Software Sandboxing using {WebAssembly}},
year = {2022}
}