Background
Modern browser attacks typically begin with malicious JavaScript that
triggers a memory corruption vulnerability. Attackers then use WASM’s in-memory
table structures to write to unauthorized memory addresses and gain execution
rights.
WASM Guard functions as a validator at the memory translation layer.
Similar to how a DNS resolver maps names to IP addresses, WASM Guard verifies that
each memory access request maps to an approved address range. If a process attempts
to access memory outside its allowed scope, WASM Guard immediately terminates the
action.
This follows MITRE ATT&CK T1203 - Exploitation for Client Execution