Google, Adobe sandbox Flash for Chrome to protect users
Chrome's 'dev' build for Windows now blocks Flash attack code from infecting PCs
Computerworld - Adobe and Google have collaborated to put the Flash Player plug-in inside a sandbox within Chrome, an effort by the two companies to better protect users from attacks.
The sandbox has been introduced into the roughest version of Chrome -- the "dev" build -- and is currently available only on the Windows edition of Google's browser.
A "sandbox" isolates processes on the computer, preventing or at least hindering malware from escaping an application to wreak havoc on the machine.
Flash has become a very popular target for hackers, who have regularly exploited its vulnerabilities this year. Adobe has had to patch Flash five times since January, and in several cases had to issue emergency fixes to stymie ongoing attacks.
Apple, which has been squabbling with Adobe over Flash since the 2007 introduction of the iPhone, recently yanked the software from its newest MacBook Air, and plans to eliminate it from future machines as well. It cited security as the reason for dropping Flash from its Mac OS X operating system.
Google took a different tack: It worked with Adobe to craft a sandbox that shelters Flash Player.
"There was a lot of work on both sides," said Peleus Uhley, Adobe's platform security strategist, in a Wednesday interview. "The interfaces to open-source browsers are completely different from, say, Internet Explorer, and we had to restructure Flash Player to put it in a sandbox."
"The Flash Player sandbox is specifically designed around Flash's processes and functionality to protect certain sensitive resources from being accessed by malicious code, while allowing the use of less sensitive ones," said Google's Chrome team in an e-mail reply to Computerworld's questions Wednesday.
Specifically, Google's and Adobe's engineers partnered to build a "broker" process, which decides which functions Flash can conduct outside the sandbox, and mediates requests between the plug-in and the rest of the browser, as well as the operating system.
"This restricts the ability of malicious code that may be running in Flash Player to compromise sensitive system resources," Google explained.
"The concept is the same as the sandbox in Reader X," said Uhley, talking about the latest version of Adobe's PDF viewer. "The goal is the same and the model is identical: Flash Player runs with low privileges and uses a broker process. But the sandbox [in Chrome] is very different from the one in Reader X."
- Google reverses field, promises to restore Chrome's scrollbar arrows
- Update: Google ships Chrome 33, patches 28 bugs
- Mozilla's top exec defends in-Firefox ads, revenue search
- Mozilla taps in-Firefox ads as it searches for more revenue
- Mozilla ships Metro Firefox beta for Windows 8
- Mozilla defers Firefox's new 'Australis' UI to April
- Mozilla resets Metro Firefox ship date to mid-March
- Mozilla ships Firefox 26 with opening click-to-play move
- Mozilla banked $274M in '12 from Google-Firefox search deal
- Google trumpets Chrome's SPDY gains
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts