Details

CASE STUDY: XML EXTERNAL ENTITIES

Manjula Verma

Research Scholar, CMJ University, Shillong, Meghalaya

Dr. Pardeep Goel

Associate Professor M.M. College, Fatehabad

43-45

Vol: 3, Issue: 4, 2013

Receiving Date: 2013-09-05 Acceptance Date:

2013-10-04

Publication Date:

2013-11-05

Download PDF

Abstract

We compare Chromium's architecture to the architectures of other neural network browsers. Monolithic traditionally, browsers are implemented with a monolithic architecture that combines the rendering engine and the browser kernel into a single process image. For example, Internet Explorer 7, Firefox 3, and Safari 3.1 each execute in a single operating system protection domain. If an attacker can exploit an unpatched vulnerability in one of these browsers, the attacker can gain all the privileges of the entire browser. In typical con_gurations of Firefox 3 and Safari 3.1, these privileges include the full privileges of the current user. Internet Explorer 7 on Windows Vista can run in aprotected mode" [23], which runs the browser as a low integrity process. Running in protected mode, the browser is restricted from writing to the user's _le system, but an attacker exploits a vulnerability can still read the user's file system and ex-filtrate confidential documents. The VMware browser appliance [26] hosts Firefox inside a virtual machine with limited rights. The virtualmachine provides a layer of isolation that helps prevent an attacker who exploits a vulnerability inthe browser from reading or writing the user's _le system.

Keywords: Monolithic, Traditionally, rendering engine, vulnerability

References

Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.