Главная
Study mode:
on
1
Intro
2
Disclaimers
3
Chrome's Core Principles
4
Chrome Security Team
5
Browser Security?
6
Top Threats on the Web
7
Browser Exploits Malicious code that aims to achieve remote code execution on victim's computer by exploiting a security bug in the browser.
8
Counterthreat Step 1: Find and fix security bugs. Update users.
9
Find Bugs via Fuzzing
10
Pay for Bugs
11
Pay for Exploits
12
Fix Bugs, Update Users. Fast.
13
Defense in Depth
14
Process Sandboxing
15
Plugin Sandboxing
16
Plugin Blocking
17
Phishing & Malware Sites Get a user to visit or load a malicious website that either (a) phishes their personal data or (b) delivers some malicious payload leg malware .
18
Block Badness
19
Find Badness
20
Notify of Badness
21
Attacks to SSL Violate the security and privacy guarantees of SSL to steal user information
22
Gimme some SSL!
23
SSL Protocol Handshake
24
Man-in-the-Middle Attack
25
Certificate Pinning Chrome comes preloaded with the certificates it expects to see for Google-owned websites, and if it does not see one of those when it visits a Google owned website, it shows an er…
26
Certificate Pinning FTW!
27
HTTP Strict Transport Security
28
HSTS Whitelisted Services
29
Closing Thoughts Browser security matters. It should be a factor in choosing the software you use.
30
Questions? Complaints?
Description:
Explore Chrome's security features and strategies in this 41-minute conference talk from Strange Loop 2013. Dive into the browser's core principles of speed, simplicity, and security as Google's "Security Princess" Parisa Tabriz discusses current online threats and Chrome's protective measures. Learn about the Chrome security team's philosophies, successes, and ongoing challenges in browser security. Discover how Chrome tackles top web threats, including browser exploits, phishing, malware, and SSL attacks. Gain insights into Chrome's multi-layered defense approach, featuring process sandboxing, plugin management, and certificate pinning. Understand the importance of browser security in today's digital landscape and how it should influence your software choices.

Chrome Security Secret Sauce

Strange Loop Conference
Add to list
0:00 / 0:00