How Firefox Uses In-process Sandboxing to Protect Itself From Exploitable Libraries
Offered By: Black Hat via YouTube
Course Description
Overview
Explore how Firefox utilizes in-process sandboxing to protect against vulnerabilities in third-party C libraries in this 23-minute Black Hat conference talk. Discover the innovative approach developed by the Firefox team to mitigate zero-day attacks stemming from memory safety issues in external libraries. Learn about the lightweight in-memory sandboxes based on WebAssembly that Firefox has been implementing since 2020 to isolate components like media rendering and spell checking. Delve into the challenges faced during the implementation of this architecture and gain insights into how this technique can be applied to enhance security in other applications. Presented by Tal Garfinkel, Shravan Narayan, and Deian Stefan, this talk offers valuable knowledge for developers and security professionals seeking to improve software resilience against exploitable dependencies.
Syllabus
How Firefox Uses In-process Sandboxing To Protect Itself From Exploitable Libraries
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube