Adobe to beef up PDF security with Reader sandboxing
Will isolate processes in Reader 10 later this year to block malware execution
Computerworld - Adobe Systems Inc. today announced that it will harden the next version of its popular Reader PDF viewer, a frequent target of attacks, by adding "sandboxing" technology to the software.
Sandboxing, perhaps best known for its use in Google Inc.'s Chrome browser, isolates processes from one another and the rest of the machine, preventing or hindering malicious code from escaping an application to wreak havoc or infect the computer.
Previously, security experts had said that sandboxing Reader would be a smart move by Adobe as it struggled to lock down the program and prevent vulnerabilities from being exploited by hackers.
According to Brad Arkin, Adobe's director of security and privacy, sandboxing will be added to the next major Windows upgrade to Reader, Version 10, before the end of the year. The company declined to provide a more specific timeline.
"With sandboxing, anyone who encounters a malicious PDF will find that a successful exploit is kept within the sandbox," said Arkin, describing the advantages of the technology, which is also used by Microsoft's Internet Explorer 7 and IE8, as well as by Office 2010. Although attacks may still succeed, they would require a second exploit, one that allows the attacker to move malware outside the sandbox, to be effective.
The Reader browser plug-in already makes use of IE7's and IE8's Protected Mode -- the name for sandboxing in Microsoft's browser -- as well as Chrome's isolation functionality, but the addition to Reader in general will also protect Firefox users from attack, as well as people who run the stand-alone version of the PDF viewer.
Initially, Reader will sandbox only "write" calls by the program -- blocking attempts by malware to install malicious code on the system -- but a minor release in the future will extend the technology to read-only activities, such as those aimed at pillaging the PC of important information, such as credit card numbers or passwords.
The technology, which will be switched on by default, will be tagged as Protected Mode, the same term used by Microsoft in IE7 and IE8.
Adobe did more than borrow the label from Microsoft. "Microsoft and Google offered a lot of advice," acknowledged Arkin, who said that Adobe based its technology on techniques described in 2007 by David LeBlanc, a Microsoft secure code expert, and with fellow Microsoft developer Michael Howard, co-author of Writing Secure Code.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts