
Mikhail KatychevMimic
No eBPF on Windows? We at Mimic run WASM in the kernel instead! See how we deploy live security patches, extend OS telemetry capabilities, and inject custom logic, all in relative safety and without a single reboot.
When evaluating how to safely extend and observe potential threats to the kernel in the absence of a mature eBPF implementation for Windows, our team at Mimic decided to experiment using the WebAssembly Component Model for running threat detection logic with promising results.
This talk will dissect the major benefits and challenges of distributing, testing, and running threat detection logic as WASM components in Windows kernel. We will discuss novel applications and current pain points in using the Component Model to bridge std (standard library) and no_std contexts and share the patterns and workarounds we use to coordinate WASM module deployment in the name of cybersecurity.
Some of the practical challenges and accomplishments below will be covered in our talk:
Early Bird
Conference Ticket WASM I/O 26
Until December 4th
Barcelona
Mar • 19- 20 • 2026
2-Day Conference
AXA Convention Center
Standard
After 4th Dec
Until February 19th
Barcelona
Mar • 19- 20 • 2026
2-Day Conference
AXA Convention Center
Late Bird
After 19th Feb
24 Feb 26 - 18 Mar 26