Security/ProcessIsolation/ThreatModel: Difference between revisions

Jump to navigation Jump to search
Line 20: Line 20:
*process could import an external library and call its functions
*process could import an external library and call its functions
*process could take advantage of race conditions to modify a system call / message between the time a security check is performed and the API is actually called
*process could take advantage of race conditions to modify a system call / message between the time a security check is performed and the API is actually called
*process could take advantage of interprocess communications to executed code within an elevated context (see: http://en.wikipedia.org/wiki/Shatter_attack for an example)


==System / Local Network Data Theft==
==System / Local Network Data Theft==
Confirmed users
717

edits

Navigation menu