🦞🌯 Lobster Roll

Thread

Converting untrusted PDFs into trusted ones: The Qubes Way (2013) (blog.invisiblethings.org)

Stories related to "Converting untrusted PDFs into trusted ones: The Qubes Way (2013)" across the full archive.

Converting untrusted PDFs into trusted ones: The Qubes Way (2013) (blog.invisiblethings.org)
Jailed 0.2 now runs untrusted code inside a web-worker inside a sandboxed iframe (github.com)
PSA: don't run 'strings' on untrusted files (lcamtuf.blogspot.com)
Shielding Applications from an Untrusted Cloud with Haven (usenix.org)
Intel manual on SGX (pdf) : [link](https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf)
Secure Execution of Untrusted Scripts (forwardjs.com)
Escaping the Lua 5.2 Sandbox With Untrusted Bytecode (apocrypha.numin.it)
A good friend of mine did this work, and finally got it into a shape they felt was worth sharing. They're also looking for work, so if you like what you see, you should contact them. ;)
Minijail: Running Untrusted Programs Safely (youtube.com)
Windows; unsandboxed highly privileged JavaScript interpreter is used to evaluate untrusted code (bugs.chromium.org)
A Touch of Evil: High-Assurance, Cryptographic Hardware from Untrusted Components (2017) (acmccs.github.io)
google/puffs: Parsing Untrusted File Formats Safely (github.com)
Quantifying Untrusted Symantec Certificates (arkadiyt.com)
Wrangling Untrusted File Formats Safely (github.com)
Untrusted (github.com)
StackVault: Protection from Untrusted Functions (arxiv.org)
Blocking untrusted USB devices (roussos.cc)
Untrusted - a user javascript adventure game (alexnisnevich.github.io)
Don't Share Your $HOME with Untrusted Guests (zerodayengineering.com)
Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions (2019) (seahorn.github.io)
Abstract: "Extended Berkeley Packet Filter (eBPF) is a Linux subsystem that allows safely executing untrusted user-defined extensions inside the kernel. It relies on static analysis to protect the kernel against buggy and malicious extensions. As the eBPF ecosystem evolves to support more complex...
wuffs: Wrangling Untrusted File Formats Safely (github.com)
Clang Checkers & CodeQL Queries for Detecting Untrusted Pointer Derefs and Tainted Loop Conditions (thezdi.com)
Using Firecracker and Go to run short-lived, untrusted code execution jobs (stanislas.blog)
Javascript Destructing and Untrusted Data (petecorey.com)
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes (2011) (cs.gmu.edu)
ldd(1) and untrusted binaries (jmmv.dev)
Running Untrusted Python Code (healeycodes.com)
Syncthing - Untrusted Device Encryption (docs.syncthing.net)
DOM Purify - untrusted Node bypass (blog.slonser.info)
isolate: Sandbox for securely executing untrusted programs (github.com)
Cabin: Confining Untrusted Programs Within Confidential VMs (arxiv.org)
Pulling a container image with a known good digest from an untrusted registry (infosec.exchange)