Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Firefox Uses In-process Sandboxing to Protect Itself From Exploitable Libraries

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how Firefox utilizes in-process sandboxing to protect against vulnerabilities in third-party C libraries in this 23-minute Black Hat conference talk. Discover the innovative approach developed by the Firefox team to mitigate zero-day attacks stemming from memory safety issues in external libraries. Learn about the lightweight in-memory sandboxes based on WebAssembly that Firefox has been implementing since 2020 to isolate components like media rendering and spell checking. Delve into the challenges faced during the implementation of this architecture and gain insights into how this technique can be applied to enhance security in other applications. Presented by Tal Garfinkel, Shravan Narayan, and Deian Stefan, this talk offers valuable knowledge for developers and security professionals seeking to improve software resilience against exploitable dependencies.

Syllabus

How Firefox Uses In-process Sandboxing To Protect Itself From Exploitable Libraries

Taught by

Black Hat

Reviews

Start your review of How Firefox Uses In-process Sandboxing to Protect Itself From Exploitable Libraries

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.