Mon 2 Jun 2025 11:20 - 11:45 at S 9 - Implementation Adventures

Memory safety is a critical property for web browsers: all Chrome exploits caught in the wild (2021 – 2023) started out with a memory corruption vulnerability in a Chrome renderer process that was exploited for remote code execution (RCE). Of these, 60% were vulnerabilities in V8. However, there is a catch: V8 vulnerabilities are rarely “classic” memory corruption bugs (use-after-frees, out-of-bounds accesses, etc.) but instead subtle logic issues which in turn allow for the construction of unusually powerful and reliable exploits. Furthermore, these bugs are unlikely to be mitigated by memory safe languages or upcoming hardware-assisted security features such as MTE or CFI in isolation. We propose addressing this problem with a lightweight, in-process sandbox, called V8 Sandbox. The sandbox limits the impact of typical V8 vulnerabilities by restricting the code executed by V8 to a subset of the process’ virtual address space (“the sandbox”), thereby isolating it from the rest of the process. This works purely in software by effectively converting regular full pointers either into offsets from the base of the sandbox or into indices into out-of-sandbox pointer tables. In principle, these mechanisms are very similar to the userland/kernel separation used by modern operating systems (e.g. the unix file descriptor table).

Mon 2 Jun

Displayed time zone: Belgrade, Bratislava, Budapest, Ljubljana, Prague change

10:30 - 12:10
Implementation AdventuresMoreVMs at S 9
10:30
25m
Talk
Adding garbage collection to our Rust-based interpreters with MMTk
MoreVMs
Octave Larose University of Kent
Link to publication
10:55
25m
Talk
Comparing R bytecode compilers written in R, Java, and Rust
MoreVMs
Pierre Donat-Bouillud Czech Technical University in Prague, Filip Křikava Czech Technical University in Prague, Jakob Hain Purdue University, USA, Adam Plodek Vyper Lang, Jan Vitek Northeastern University
11:20
25m
Talk
The V8 Sandbox
MoreVMs
Link to publication
11:45
25m
Talk
Towards a Java Virtual Machine for Processing-in-Memory
MoreVMs
Kazuki Ichinose The University of Tokyo, Shigeyuki Sato The University of Electro-Communications, Tomoharu Ugawa University of Tokyo