The Security Architecture of the Chromium Browser
来源:互联网 发布:tensorflow中文教程 编辑:程序博客网 时间:2024/05/22 06:28
The Security Architecture of the Chromium Browser
Most current web browsers employ a monolithic architecture that combines "the user" and "the web" into a single protection domain. An attacker who exploits an arbitrary code execution vulnerability in such a browser can steal sensitive files or install malware. In this paper, we present the security architecture of Chromium, the open-source browser upon which Google Chrome is built. Chromium has two modules in separate protection domains: a browser kernel, which interacts with the operating system, and a rendering engine, which runs with restricted privileges in a sandbox. This architecture helps mitigate high-severity attacks without sacrificing compatibility with existing web sites. We define a threat model for browser exploits and evaluate how the architecture would have mitigated past vulnerabilities.
More Stanford web security research
- The Security Architecture of the Chromium Browser
- The Architecture Of Avalon
- The architecture of REDIS
- The Architecture of Nginx
- The architecture of REDIS
- The Architecture Of LLVM
- Breaking Out of the Browser
- The code architecture of***ResponseHandler
- the architecture of snapdragon 800
- the understanding of the MVC architecture
- The Craft of System Security
- how to know the type of browser
- History of the browser user-agent string
- 25 Secrets of the Browser Developer Tools
- Firefox Could not initialize the browser's security component
- Conceptual Architecture of the Linux Kernel(ZT)
- Architecture of the TCG Software Stack
- An overview of the ARM architecture
- Inter-process Communication (IPC)
- Threading
- 数据库备份的校验
- Multi-process Resource Loading
- 新手操作电脑最忌讳的十八个动作
- The Security Architecture of the Chromium Browser
- 来看看反外挂程序员都需要些什么样的技术
- 磁盘阵列与普通硬盘IO性能分析
- 向量各算法
- Plugin Architecture
- 菜鸟必练入侵命令
- linux下php实现C/C++扩展编程
- Profile Architecture
- 将文件导入导出数据库