
Falliere, N. (2018). Reverse engineering WebAssembly. ht
tps://www.pnfsoftware.com/reversing-wasm.pdf.
Galante, L., Botacin, M., Grégio, A., and de Geus, P.
(2019). Forseti: Extração de características e classi-
ficação de binários ELF. In Anais Estendidos do XIX
Simpósio Brasileiro de Segurança da Informação e de
Sistemas Computacionais, pages 5–10, São Paulo, SP,
Brazil. SBC.
Heinrich, T., Will, N. C., Obelheiro, R. R., and Maziero,
C. A. (2024). A categorical data approach for anomaly
detection in WebAssembly applications. In Proceed-
ings of the 10th International Conference on Infor-
mation Systems Security and Privacy, pages 275–284,
Rome, Italy. SciTePress.
Hoffman, K. (2019). Programming WebAssembly with
Rust: Unified Development for Web, Mobile, and
Embedded Applications. The Pragmatic Bookshelf,
Raleigh, NC, USA.
Kim, M., Jang, H., and Shin, Y. (2022). Avengers, Assem-
ble! survey of WebAssembly security solutions. In
Proceedings of the 15th International Conference on
Cloud Computing, pages 543–553, Barcelona, Spain.
IEEE.
Kirchmayr, W., Moser, M., Nocke, L., Pichler, J., and To-
ber, R. (2016). Integration of static and dynamic code
analysis for understanding legacy source code. In Pro-
ceedings of the International Conference on Software
Maintenance and Evolution, pages 543–552, Raleigh,
NC, USA. IEEE.
Lehmann, D., Kinder, J., and Pradel, M. (2020). Everything
old is new again: Binary security of WebAssembly. In
Proceedings of the 29th USENIX Security Symposium,
pages 217–234, Boston, MA, USA. USENIX Associ-
ation.
Lehmann, D. and Pradel, M. (2022). Finding the DWARF:
Recovering precise types from WebAssembly bina-
ries. In Proceedings of the 43rd International Con-
ference on Programming Language Design and Im-
plementation, pages 410–425, San Diego, CA, USA.
ACM.
Lemos, R., Heinrich, T., Maziero, C. A., and Will, N. C.
(2022). Is it safe? identifying malicious apps through
the use of metadata and inter-process communica-
tion. In Proceedings of the 16th Annual IEEE Interna-
tional Systems Conference, pages 1–8, Montreal, QC,
Canada. IEEE.
Lemos, R., Heinrich, T., Will, N. C., Obelheiro, R. R., and
Maziero, C. A. (2023). Inspecting binder transactions
to detect anomalies in android. In Proceedings of the
17th Annual IEEE International Systems Conference,
Vancouver, BC, Canada. IEEE.
Liu, M., Xue, Z., Xu, X., Zhong, C., and Chen, J. (2018).
Host-based intrusion detection system with system
calls: Review and future trends. ACM Computing Sur-
veys, 51(5):98.
Michael, A. E., Gollamudi, A., Bosamiya, J., Johnson, E.,
Denlinger, A., Disselkoen, C., Watt, C., Parno, B.,
Patrignani, M., Vassena, M., and Stefan, D. (2023).
MSWasm: Soundly enforcing memory-safe execution
of unsafe code. Proceedings of the ACM on Program-
ming Languages, 7(POPL).
Naseem, F. N., Aris, A., Babun, L., Tekiner, E., and Ulu-
agac, A. S. (2021). MINOS: A lightweight real-time
cryptojacking detection system. In Proceedings of the
Network and Distributed System Security Symposium,
Virtual Event. Internet Society.
Pickard, C. and Miladinov, S. (2012). Rogue software:
Protection against potentially unwanted applications.
In Proceedings of the 7th International Conference
on Malicious and Unwanted Software, Fajardo, PR,
USA. IEEE.
Quan, L., Wu, L., and Wang, H. (2019). EVulHunter: De-
tecting fake transfer vulnerabilities for EOSIO’s smart
contracts at WebAssembly-level.
Romano, A., Lehmann, D., Pradel, M., and Wang, W.
(2022). Wobfuscator: Obfuscating JavaScript mal-
ware via opportunistic translation to WebAssembly.
In Proceedings of the 43rd Symposium on Security
and Privacy, pages 1574–1589, San Francisco, CA,
USA. IEEE.
Rossberg, A. (2018). Webassembly specification. https:
//webassembly.github.io/spec/core/_download/WebA
ssembly.pdf.
Rozi, M. F., Kim, S., and Ozawa, S. (2020). Deep neu-
ral networks for malicious javascript detection using
bytecode sequences. In Proceedings of the Interna-
tional Joint Conference on Neural Networks, pages 1–
8, Glasgow, UK. IEEE.
Stallings, W., Brown, L., Bauer, M. D., and Bhattachar-
jee, A. K. (2012). Computer Security: Principles and
Practice. Pearson.
Stiévenart, Q., De Roover, C., and Ghafari, M. (2022). Se-
curity risks of porting C programs to WebAssembly.
In Proceedings of the 37th Symposium on Applied
Computing, pages 1713–1722, Virtual Event. ACM.
APPENDIX
Tags Considered in the Training Process
lines, language, dw_tag_subprogram,
dw_tag_typedef, dw_tag_member, dw_tag_label,
dw_tag_gnu_call_site, dw_at_gnu_all_call_sites,
dw_tag_inlined_subroutine, dw_at_external,
dw_at_call_file, int_type, uint_type, string_type,
fp_type, bool_type, dw_tag_enumerator,
dw_tag_variable_int, dw_tag_variable_uint,
dw_tag_variable_string, dw_tag_variable_fp,
dw_tag_variable_bool, dw_tag_variable,
dw_tag_formal_parameter_int,
dw_tag_formal_parameter_uint,
dw_tag_formal_parameter_string,
dw_tag_formal_parameter_fp,
dw_tag_formal_parameter,
dw_tag_formal_parameter_bool
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries
449