Overview
This course covers the learning outcomes and goals of understanding the current and future implications of malicious WebAssembly. It teaches about the native web, WebAssembly introduction and performance, using Wasm modules, attacker models, prevalence, extent of usage, cluster analysis, mining, cryptojacking, obfuscation, and possible progress. The teaching method includes lectures and discussions. The intended audience for this course is individuals interested in cybersecurity, web development, and programming.
Syllabus
Intro
The native Web
WebAssembly (Wasm) Introduced March 2017
Wasm performance
Wasm ports
Using Wasm modules
Attacker models
Crawling
Prevalence
Extent of usage
Cluster analysis
Custom, Library and Test
Games
Primer on mining
Cryptojacking/ Mining
Obfuscation
Possible progress
Conclusion
Taught by
OWASP Foundation