SVG - Exploiting Browsers without Image Parsing Bugs - Black Hat [PDF]
Recommend Documents
Jun 19, 2015 - 7. Conclusion. 06/19/2015. Exploiting Out-of-Order-Execution. 9/46 ... Channel & noise amplifies in a
. Can be nastier: .... ....
Feb 21, 2008 - Software attacks (weak VMM isolation) ... Unauthenticated, insecure migration data plane ... Manipulate t
Analyzing obfuscated Javascript code. â The âeasyâ way ... s/eval/print/. â Hooking the eval function with Javas
2. What is a Darknet? A private network where users can freely exchange ideas and content. Darknets ... Server/Client Peer-2-Peer ... HTML 5 Features.
93.1. 91.3. 95.5. 92.2. 96.2. 90.3. 95.2. 91.2. 92.2. 87.9. 94.7. 85.4. 94.4. Tree. 5. 81.9. 90.2. 83.4 ..... Co-Labeling of Image Sets,â in WACV, 2014. [16] M. Brand ...
Jan 23, 2009 - A flaw in the random number generator calling function can be used to ... Address Space Layout Randomizat
Jul 30, 2009 - Delegate method: applicationDidFinishLaunching: ..... chunks with the ith chunk XOR-ed with the 1's compl
Jul 30, 2009 - Apple's keyboards. Firmware bugs. 2. Firmware Update. 3. Analysis. 4. Exploitation. K. Chen. Reversing an
Jul 30, 2009 - âa person who has lawfully obtained the right to use a copy of a computer program may circumvent a tech
is, inject frame busting code when the user agent is an iPhone or Android and ..... A screenshot of our attack tool is visible in figure 10 and a video of the attack is ...
Figure 4: Our Google Android Developer Account Activated . ... 10. Figure 7: First Sign of Bouncer . ... Figure 10: SMS Bloxor Available to Purchase â Cheap!
Neohapsis 2014 â www.Neohapsis.com. 10. 2 Simple Examples: #2. Err? .... Linux, BSD, Android), and baked in some way into commercial kit (. ).
... under certain scenarios with a few tricks. Bypassing the important stuff: demo #2 ... An entire HTML page can be stored in Data URI. Let's do a facebook ...
effective in handling inter-class selectivity in object detec- tion tasks [8, 11, 22]. ... intra-class variations and ot
effective in handling inter-class selectivity in object detec- tion tasks [8, 11, 22]. ... automatically aligning real-w
Increasing use of C++ code in malware .... test eax, eax ; eax = address of allocated memory ..... Developed in Python .
... a userland memory allocator that is being increasingly adopted by software projects as a high performance heap manag
Apr 14, 2010 - Backdoors in the Authentication Procedure. â« Onapsis Integrity .... No CRC or signature check on the st
is, inject frame busting code when the user agent is an iPhone or Android and do not inject it if the browser is an olde
Aug 7, 2014 - Using SVG with HTML. SVG features. 2 Attacking SVG. Attack surface. Security model. Security model violations. 3 Content Security Policy.
SVG Exploiting Browsers without Image Parsing Bugs
Rennie deGraaf
iSEC Partners 07 August 2014
Rennie deGraaf (iSEC Partners)
SVG Security
BH USA 2014
1 / 55
Outline 1
A brief introduction to SVG What is SVG? Using SVG with HTML SVG features
2
Attacking SVG Attack surface Security model Security model violations
3
Content Security Policy A brief introduction CSP Violations
4
Conclusion Rennie deGraaf (iSEC Partners)
SVG Security
BH USA 2014
2 / 55
A brief introduction to SVG
What is SVG?
What is SVG?
Scalable Vector Graphics
XML-based W3C (http://www.w3.org/TR/SVG/) Development started in 1999 Current version is 1.1, published in 2011 Version 2.0 is in development First browser with native support was Konqueror in 2004; IE was the last major browser to add native SVG support (in 2011)
Rennie deGraaf (iSEC Partners)
SVG Security
BH USA 2014
3 / 55
A brief introduction to SVG
What is SVG?
A simple example Source code
< ? xml v e r s i o n = ” 1 . 0 ” e n c o d i n g = ” UTF−8” s t a n d a l o n e = ” no ” ? >