Web browsers are integral parts of everyone's daily life. They are commonly used for security-critical and privacy sensitive tasks, like banking transactions and checking medical records. Unfortunately, modern web browsers are too complex to be bug free (e.g., 25 million lines of code in Chrome), and their role as an interface to the cyberspace makes them an attractive target for attacks. Accordingly, web browsers naturally become an arena for demonstrating advanced exploitation techniques by attackers and state-of-the-art defenses by browser vendors. Web browsers, arguably, are the most exciting place to learn the latest security issues and techniques, but remain as a black art to most security researchers because of their fast-changing characteristics and complex code bases. To bridge this gap, this paper attempts to systematize the security landscape of modern web browsers by studying the popular classes of security bugs, their exploitation techniques, and deployed defenses. More specifically, we first introduce a unified architecture that faithfully represents the security design of four major web browsers. Second, we share insights from a 10-year longitudinal study on browser bugs. Third, we present a timeline and context of mitigation schemes and their effectiveness. Fourth, we share our lessons from a full-chain exploit used in 2020 Pwn2Own competition. and the implication of bug bounty programs to web browser security. We believe that the key takeaways from this systematization can shed light on how to advance the status quo of modern web browsers, and, importantly, how to create secure yet complex software in the future.
翻译:网络浏览器是每个人日常生活不可分割的一部分。 它们通常用于安全关键和隐私敏感的任务,如银行交易和检查医疗记录。 不幸的是,现代网络浏览器过于复杂,无法无虫(例如,2500万条Chrome代码行),而且作为网络空间界面的界面,它们的作用使他们成为攻击攻击目标的诱人。因此,网络浏览器自然成为展示攻击者先进剥削技术和浏览器供应商最尖端防御的场所。可以说,网络浏览器是了解最新安全问题和技术的最令人兴奋的地方,但对于大多数安全研究人员来说仍然是黑色艺术,因为他们的特点和复杂的代码基础迅速变化。为了缩小这一差距,本文试图通过研究流行的安全错误类别、其开发技术和部署防御系统,使现代网络浏览器的安全景观系统系统系统系统系统系统系统系统系统系统系统系统系统系统系统系统系统化,从网络浏览系统系统系统系统系统系统化到网络浏览系统系统系统化系统化系统系统化系统化系统化系统化系统化。 第四,我们从网络浏览系统化到网络浏览器化系统化系统系统化系统化系统化系统系统化系统化,从系统化到网络定位系统化系统系统化系统化系统化系统化系统化系统化系统系统系统化,我们系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化,系统化, 以及网络化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化系统化,系统化,系统化,我们系统化,我们系统化系统化系统化系统化系统化,系统化,系统化系统化,系统化,我们系统化系统化,系统化,系统化系统化系统化系统化,系统化,系统化系统化系统化,系统化系统化系统化系统化系统化,系统化,系统化,系统化,系统化系统化,系统化,系统化系统化系统化系统化系统化系统化系统化系统化,系统化系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,系统化,