11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.7. Example Problemstem mitigations, exploitable memory errors are still being found even inthe latest versions of widely used applications. The rise of mobile operatingsystems such as iOS and Android, in which third-party applicationsrun with lower privileges, has also made kernel-level memory corruptionvulnerabilities more relevant than ever—an area that has received lessattention compa<strong>red</strong> to user-level applications because of the differentthreat model that usually applies on personal computers compa<strong>red</strong> tomobile devices.Data exposure vulnerabilities: the fairly new ecosystem of feature-rich webservices and cloud-based applications, with the numerous componentsand interactions that are involved, continuously exposes subtle flawsin the languages, APIs, protocols, and client or server software used.Although so far a great deal of attention has been paid to preventing auser’s machine being taken over, as user data are shifted to the cloud,vulnerabilities in any of the above stages can lead to the exposure of confidentialinformation, ranging from browser cookies to private documents,with equally harmful consequences.33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!