Chrome Security Secret Sauce
Offered By: Strange Loop Conference via YouTube
Course Description
Overview
Syllabus
Intro
Disclaimers
Chrome's Core Principles
Chrome Security Team
Browser Security?
Top Threats on the Web
Browser Exploits Malicious code that aims to achieve remote code execution on victim's computer by exploiting a security bug in the browser.
Counterthreat Step 1: Find and fix security bugs. Update users.
Find Bugs via Fuzzing
Pay for Bugs
Pay for Exploits
Fix Bugs, Update Users. Fast.
Defense in Depth
Process Sandboxing
Plugin Sandboxing
Plugin Blocking
Phishing & Malware Sites Get a user to visit or load a malicious website that either (a) phishes their personal data or (b) delivers some malicious payload leg malware .
Block Badness
Find Badness
Notify of Badness
Attacks to SSL Violate the security and privacy guarantees of SSL to steal user information
Gimme some SSL!
SSL Protocol Handshake
Man-in-the-Middle Attack
Certificate Pinning Chrome comes preloaded with the certificates it expects to see for Google-owned websites, and if it does not see one of those when it visits a Google owned website, it shows an error page to the user and will not let the user continue.
Certificate Pinning FTW!
HTTP Strict Transport Security
HSTS Whitelisted Services
Closing Thoughts Browser security matters. It should be a factor in choosing the software you use.
Questions? Complaints?
Taught by
Strange Loop Conference
Tags
Related Courses
Cloud IDS: Qwik StartGoogle via Google Cloud Skills Boost Advanced Malware and Network Anomaly Detection
Johns Hopkins University via Coursera Cybersecurity for IT Professionals
LinkedIn Learning Improve Your Wireshark Skills
LinkedIn Learning Detect threats and protect information in cloud apps using Microsoft Defender for Cloud Apps
Microsoft via Microsoft Learn