Introduction To Browser Isolation
Introduction To Browser Isolation
5
Introduction to Browser Isolation
Web browser: an analogy
See: http://dev.chromium.org/developers/design-documents/sandbox/
Design Decisions
Compatibility
Sites rely on the existing browser security policy
Browser is only as useful as the sites it can render
Rules out more clean slate approaches
Black Box
Only renderer may parse HTML, JavaScript, etc.
Kernel enforces coarse-grained security policy
Renderer to enforces finer-grained policy decisions
Minimize User Decisions
Task Allocation
Leverage OS Isolation
Sandbox based on four OS mechanisms
A restricted token
The Windowsjobobject
The Windowsdesktopobject
Windows Vista only: integrity levels
Specifically, the rendering engine
adjusts security token by converting SIDS to DENY_ONLY,
adding restricted SID, and calling AdjustTokenPrivileges
runs in a Windows Job Object, restricting ability to create
new processes, read or write clipboard, ..
runs on a separate desktop, mitigating lax security checking
of some Windows APIs
See: http://dev.chromium.org/developers/design-documents/sandbox/
Evaluation: CVE count
Total CVEs: