Download presentation
Presentation is loading. Please wait.
Published byAlyson Fox Modified over 8 years ago
1
Shuo Chen Microsoft Research One Microsoft Way David Ross Security Technology Unit, Microsoft One Microsoft Way Yi-Min Wang Microsoft Research One Microsoft Way Presented By: Yasser Yahia Abd El-Fattah
2
Problem description. Related Work XSS bugs in Java applications. The Tahoma Virtual Machine Monitor (VMM).
4
Exploiting the Interactions between IE and Windows Explorer. Exploiting Function Aliasing. Exploiting the Excessive Expressiveness of Frame Navigation Calls. Exploiting the Semantics of User Events.
9
The Accent Key. Accenting and De-accenting. Why the XOR operation. How to implement the mechanism.
10
The mechanism was tested on IE v6 and proved that it can defeat the different attacks described. The mechanism is able to be implemented on IE v7 due to the no difference between the structure of the two versions.
11
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. The implementation of IE’s domain-isolation mechanism and the previously reported attacks. The proposed the script accenting technique as a light-weight transparent defense against these attacks.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.