Google, Adobe sandbox Flash for Chrome to protect users
Chrome's 'dev' build for Windows now blocks Flash attack code from infecting PCs
Computerworld - Adobe and Google have collaborated to put the Flash Player plug-in inside a sandbox within Chrome, an effort by the two companies to better protect users from attacks.
The sandbox has been introduced into the roughest version of Chrome -- the "dev" build -- and is currently available only on the Windows edition of Google's browser.
A "sandbox" isolates processes on the computer, preventing or at least hindering malware from escaping an application to wreak havoc on the machine.
Flash has become a very popular target for hackers, who have regularly exploited its vulnerabilities this year. Adobe has had to patch Flash five times since January, and in several cases had to issue emergency fixes to stymie ongoing attacks.
Apple, which has been squabbling with Adobe over Flash since the 2007 introduction of the iPhone, recently yanked the software from its newest MacBook Air, and plans to eliminate it from future machines as well. It cited security as the reason for dropping Flash from its Mac OS X operating system.
Google took a different tack: It worked with Adobe to craft a sandbox that shelters Flash Player.
"There was a lot of work on both sides," said Peleus Uhley, Adobe's platform security strategist, in a Wednesday interview. "The interfaces to open-source browsers are completely different from, say, Internet Explorer, and we had to restructure Flash Player to put it in a sandbox."
"The Flash Player sandbox is specifically designed around Flash's processes and functionality to protect certain sensitive resources from being accessed by malicious code, while allowing the use of less sensitive ones," said Google's Chrome team in an e-mail reply to Computerworld's questions Wednesday.
Specifically, Google's and Adobe's engineers partnered to build a "broker" process, which decides which functions Flash can conduct outside the sandbox, and mediates requests between the plug-in and the rest of the browser, as well as the operating system.
"This restricts the ability of malicious code that may be running in Flash Player to compromise sensitive system resources," Google explained.
"The concept is the same as the sandbox in Reader X," said Uhley, talking about the latest version of Adobe's PDF viewer. "The goal is the same and the model is identical: Flash Player runs with low privileges and uses a broker process. But the sandbox [in Chrome] is very different from the one in Reader X."
- IE6: Retired but not dead yet
- Chrome users won't give up, keep pressing Google to restore old-style new tab page
- Google quashes 31 vulnerabilities, restores Metro mode 'steppers' with Chrome 34
- Firefox's UI face-lift on track for April debut
- Ex-Mozilla engineer blames Microsoft's rules for Metro Firefox's death
- Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
- Google reverses field, promises to restore Chrome's scrollbar arrows
- Update: Google ships Chrome 33, patches 28 bugs
- Mozilla's top exec defends in-Firefox ads, revenue search
- Mozilla taps in-Firefox ads as it searches for more revenue
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts