Overview
Syllabus
Intro
Disclaimers
Chrome's Core Principles
Chrome Security Team
Browser Security?
Top Threats on the Web
Browser Exploits Malicious code that aims to achieve remote code execution on victim's computer by exploiting a security bug in the browser.
Counterthreat Step 1: Find and fix security bugs. Update users.
Find Bugs via Fuzzing
Pay for Bugs
Pay for Exploits
Fix Bugs, Update Users. Fast.
Defense in Depth
Process Sandboxing
Plugin Sandboxing
Plugin Blocking
Phishing & Malware Sites Get a user to visit or load a malicious website that either (a) phishes their personal data or (b) delivers some malicious payload leg malware .
Block Badness
Find Badness
Notify of Badness
Attacks to SSL Violate the security and privacy guarantees of SSL to steal user information
Gimme some SSL!
SSL Protocol Handshake
Man-in-the-Middle Attack
Certificate Pinning Chrome comes preloaded with the certificates it expects to see for Google-owned websites, and if it does not see one of those when it visits a Google owned website, it shows an error page to the user and will not let the user continue.
Certificate Pinning FTW!
HTTP Strict Transport Security
HSTS Whitelisted Services
Closing Thoughts Browser security matters. It should be a factor in choosing the software you use.
Questions? Complaints?
Taught by
Strange Loop Conference