YoVDO

How Firefox Uses In-process Sandboxing to Protect Itself From Exploitable Libraries

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Software Development Courses Cybersecurity Courses WebAssembly Courses

Course Description

Overview

Explore how Firefox utilizes in-process sandboxing to protect against vulnerabilities in third-party C libraries in this 23-minute Black Hat conference talk. Discover the innovative approach developed by the Firefox team to mitigate zero-day attacks stemming from memory safety issues in external libraries. Learn about the lightweight in-memory sandboxes based on WebAssembly that Firefox has been implementing since 2020 to isolate components like media rendering and spell checking. Delve into the challenges faced during the implementation of this architecture and gain insights into how this technique can be applied to enhance security in other applications. Presented by Tal Garfinkel, Shravan Narayan, and Deian Stefan, this talk offers valuable knowledge for developers and security professionals seeking to improve software resilience against exploitable dependencies.

Syllabus

How Firefox Uses In-process Sandboxing To Protect Itself From Exploitable Libraries


Taught by

Black Hat

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Testing
University of Utah via Udacity
The Hardware/Software Interface
University of Washington via Coursera
Software Debugging
Saarland University via Udacity
Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera