Conversation

Replying to and
Thanks for sharing, awesome work! The exploit table really shows how effective the Android/Linux sandboxing model is for chrome. Other platforms seem to go renderer->kernel, but the tight seccomp policy on Linux makes that jump extremely tough.
1
5
Setting up seccomp filters is extremely tough, especially on an active code base. Requires a lot of maintenance if you want to be strict. Even if the code base is static, updating libraries/dependencies means updating the policy. Edge case violations are really hard to find.
1
1
It's particularly hard to do it in a way that's portable across a bunch of OS variants without the OS helping you do it. It's really hard for an app or library to do it. It's ideally provided by the OS. Android does use seccomp-bpf for app sandboxes but not strict/fine-grained.
1
Show replies