Overview
Syllabus
Introduction
Who are you
Ideal Reader
Architecture
The IE Rush
JavaScript Attack Surface
JavaScript Engine
privileged and unprivileged contexts
trusted functions
folderlevel scripts
bin file
decompile tool
attacking the engine
why bypass restrictions
discovery
root level eval
trusted function
fix
identity
global
xqdialogue
Adobe patch
JJS API bypasses
Defending the engine
History of JavaScript
Design Decisions
Key Features
Reference Monitor
Implementation Problem
Implementation Example
Static Analysis
Point Analysis
Security Information Flow
Soundness is not necessary
Soundness is not binary
Conclusion
Taught by
Black Hat