Security/ProcessIsolation: Difference between revisions

 
Line 17: Line 17:


* Put together a team of people willing to put in a sustained effort on process isolation design and prototyping (6+ month timeframe)
* Put together a team of people willing to put in a sustained effort on process isolation design and prototyping (6+ month timeframe)
* Identify broad sets of vulnerabilities that might be mitigated by process isolation (high level threat model)
* Identify broad sets of vulnerabilities that might be mitigated by process isolation (high level threat model, here: [[Security/ProcessIsolation/ThreatModel]]
* Identify several potential architectures.  A few that come to mind, there will be more:
* Identify several potential architectures.  A few that come to mind, there will be more:
** Isolate entire Firefox process into low rights mode (sensitive I/O virtualized or brokered).  Protects system from browser vulns but does not improve stability or inter-domain security.
** Isolate entire Firefox process into low rights mode (sensitive I/O virtualized or brokered).  Protects system from browser vulns but does not improve stability or inter-domain security.
Confirmed users
717

edits