Security/ProcessIsolation/ThreatModel: Difference between revisions

Line 16: Line 16:
* flaws in system services could be exploited from an isolated process
* flaws in system services could be exploited from an isolated process


=== System Data Theft ===
=== System / Local Network Data Theft ===


Ability to steal data from the local or network filesystem.  A subset of the System Compromise category.
Ability to steal data from the system or local network.  A subset of the System Compromise category.
 
<b>Threats</b>
* a compromised privileged process would steal data from the system and local network
* an isolated process could trick a privileged process to perform an attack on its behalf (read an arbitrary file from the system or local network)
* an isolated process can still open network connections to steal data from or attack local systems


=== Cross-domain Compromise ===
=== Cross-domain Compromise ===
Confirmed users
717

edits