Reverse Engineering WebAssembly

We just published a paper deep-diving into WebAssembly from a reverse engineer point of view (wasm format, bytecode, execution environment, implementation details, etc.).

Some of it – most likely the JEB annex presenting how to use our wasm plugins to analyze and decompile WebAssembly modules – will be reformatted (and augmented) as a blog post later this summer.

Code and decompilation view of a WebAssembly module

Thank you.

3 thoughts on “Reverse Engineering WebAssembly”

Leave a Reply

Your email address will not be published. Required fields are marked *

ERROR: si-captcha.php plugin: GD image support not detected in PHP!

Contact your web host and ask them to enable GD image support for PHP.

ERROR: si-captcha.php plugin: imagepng function not detected in PHP!

Contact your web host and ask them to enable imagepng for PHP.