Lets chat V8 and perf. One of the most common exploit primitives is to abuse the fact that WASM jit pages are RWX. You ever wonder why? Ironically it's because of asm.js! (yes that old stuff) , you see asm.js code is translated to WebAssembly by V8.. Thread 1/?
This code is compiled to WASM bytecode. In the past permissions were flipped on the W^X memory but this operation was expensive. So for performance reasons those pages are RWX. JS runs faster and exploits are easier. yay! 2/?
recently V8 introduced Sparkplug docs.google.com/document/d/13c…, another performance improvement that ran info the same problem. So it seems we're getting more RWX memory.. 3/?
Now you could argue well there is still ROP which is true. However CET is ready to go, the only blocker is.. (surprise) V8. Often, Chromium is willing to take a perf hit for security (MirclePtr, sandboxes etc) but V8 is different 4/?
JavaScript performance seems to be sacred and determined to be worth the cost. This raises the question, when is a performance improvement no longer worth it? Edge struggled with similar tradeoffs around Chakra... 5/?
It is hard to grow market share when you are slower according to some random benchmark. I've always wondered if some percentage of the market would be willing to accept a 20% reduction in "performance" for a solution that is more secure. 6/?
I am told the answer is no, but I hope those people are wrong. 7/7

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Johnathan Norman

Johnathan Norman Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @spoofyroot

26 Jan
The most interesting aspect of this was the exploitation of trust in the security research community. We often take for granted the unique relationship we have with our 'adversaries'. Thread..
If you have worked in this industry long enough you likely have friends who are both blackhats and whitehats. We all play 'spot the fed' at Defcon and at times we share ideas with each other. I've shared drinks with exploit brokers, government employees and
of course my peers in industry. It's something I love about this work. These guys approached my team back in October suggesting they wanted help with research and also to report security bugs. Fortunately we are cautious and nobody got owned.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!