BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//NK7YTF
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-NK7YTF@program.why2025.org
DTSTART;TZID=CET:20250811T110000
DTEND;TZID=CET:20250811T115000
DESCRIPTION:When embedded into JavaScript\, WebAssembly modules can be "san
 dboxed" by defining a limited set of _imports_. It turns out that an obscu
 re "feature" allows us to craft an exploit which bypasses this barrier\, e
 nabling us to run arbitrary JavaScript code from within a malicious WASM m
 odule. All within spec... by accident?
DTSTAMP:20250731T184028Z
LOCATION:Cassiopeia
SUMMARY:Escaping a misleading "sandbox": breaking the WebAssembly-JavaScrip
 t barrier - Thomas Rinsma
URL:https://program.why2025.org/why2025/talk/NK7YTF/
END:VEVENT
END:VCALENDAR
