Главная
Study mode:
on
1
Introduction
2
WebLocal Boundary
3
Fuzzy WebLocal Boundary
4
Concrete Attacks
5
SOPs
6
Can we skip SOPs
7
Memory Partitioning
8
Fingerprinting
9
DataOriented Attacks
10
Browser Memory Safety
11
Google IFrame Isolation
12
Conclusion
13
Questions
Description:
Explore a security study on Chrome's process-based sandboxing presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the fuzzy boundary between web and local content, examining concrete attacks, Same-Origin Policies (SOPs), memory partitioning, and browser memory safety. Learn about fingerprinting techniques, data-oriented attacks, and Google's IFrame isolation. Gain insights from researchers at the National University of Singapore and Microsoft Research as they discuss the implications of these security vulnerabilities and potential solutions. Conclude with a Q&A session to further understand the complexities of web browser security.

The "Web/Local" Boundary Is Fuzzy - A Security Study of Chrome's Process-based Sandboxing

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00