The CISPA paper looked at how WebAssembly's "security through isolation" works in practice. Spoiler: it's more complicated than the marketing promised.
Side-Channel Attack Vectors
The main finding isn't a sandbox escape, but rather side-channel attacks through timing analysis. Basically, you can sometimes figure out what other WASM modules are doing by measuring how long certain operations take.
This happens because browsers share some JIT compilation resources between different WASM instances. If you're running untrusted WASM code alongside sensitive data processing, there might be information leakage through timing patterns.
Why This Matters for Production WASM
We're using WASM for our image processing pipeline and honestly hadn't thought much about isolation between different modules. Assumed the sandbox meant complete separation, but turns out shared compilation caches can leak timing information.
It's not catastrophic - no one's getting shell access or reading arbitrary memory. But if you're processing sensitive data in WASM, you probably want different instances to have better isolation than they currently do.
The paper suggests some mitigations around compilation strategies and resource allocation, but nothing's implemented in browsers yet.
What You Should Actually Do
This isn't a "patch immediately" situation since there's no active exploit. But it does change how you should think about WASM security if you're processing sensitive data.
For now, the best defense is isolating different WASM workloads. Don't run untrusted code in the same browser context as sensitive processing. Use separate tabs, workers, or ideally separate processes when possible.
The research paper recommends some browser-level fixes around compilation cache isolation, but those will take time to implement. Mozilla and Google both acknowledged the findings but haven't committed to specific timelines.
Really highlights that WASM's security model is more nuanced than "just sandbox everything." The execution environment is still shared in ways that can leak information, even when memory isolation works perfectly.