Thinking Outside the Sandbox: Violating Trust Boundaries in Uncommon Ways (paper)

Discussion in 'sandboxing & virtualization' started by MrBrian, Aug 9, 2014.

Thread Status:
Not open for further replies.
  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From https://www.blackhat.com/us-14/arch...x-violating-trust-boundaries-in-uncommon-ways:
     
  2. Gullible Jones

    Gullible Jones Registered Member

    Joined:
    May 16, 2013
    Posts:
    1,466
    The avenues of attack may be "uncommon" but the mechanisms all involve memory allocation and pointer manipulation exploits - use-after-free, dangling pointers, stuff like that.

    Kind of gives credence to the idea that safer languages should be used for userspace programs. e.g if the browsers were written in a language like Rust or Google Go - or Ada 95, for that matter - dangling pointers would be a nonissue.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.