Posted by Chris Evans, Security Team Browser Security Handbook  and open source releases of the fuzzers  involved  in our software testing.Some browsers share code bases with Google Chrome, and we collaborate with those browser vendors. We develop generic fuzzers that are applicable to most browsers and that we want to share with others. We spend time analyzing behavior in different browsers, and we sometimes discover bugs in the process. It benefits our users and the Internet as a whole if we work collaboratively on better web browser security. 
A few of the more interesting bugs we've researched recently include: this one in Opera  uncovered by Michal Zalewski's <canvas> fuzzer; a HTTP 449 response code issue in IE  found by Tavis Ormandy; contributions to Safari 4's security  by Robert Swiecki, SkyLined, and Dean McNamee (and others); an XMLHttpRequest leak  in Firefox discovered by Marius Schilder; and a cross-domain leak  in Chrome / Safari (the two share a common base) unearthed by Chris Evans.SSL interactions with HTTP proxies , Mozilla for sharing fuzzers , and Apple  for sharing and coordinating Webkit-based bugs.
 
 
 
 
 
 
 
  
 
 
 
댓글 6개 :
HI there all,
I was wondering if there is some sort of tutorial on how to use the malware api in combination with php.
I have searched for quite some time and all i see are blogs with peopple that are willing and asking the same. If someone can explain me ill promise to make a instruction vid and post it ;-)
Thanks in advance!!
Peter
I understand that a malware feed is available to qualified organizations. I believe we qualify. Who should I speak with about this? blscott@livesquare.com
댓글 쓰기