Tuesday, 05 September 2006

"You really don't want to go there today..."

It's a bug zapper for web browsing. It's a cool idea. How it will be secured and made solid I am not sure, but this is good news and a positive step toward solving zero-day exploits and quite possibly many vulnerabilities on unpatched browsers in the future.

Microsoft Research is working on something they call BrowserShield, which will allow Internet Explorer to detect malicious code and rewrite it, then displaying the cleaned version of any static or dynamic page in the browser to the end user.

From eWeek:

Researchers at the Redmond, Wash., company have completed work on a prototype framework called BrowserShield that promises to allow IE to intercept and remove, on the fly, malicious code hidden on Web pages, instead showing users safe equivalents of those pages.

"We basically intercept the Web page, inject our logic and transform the page that is eventually rendered on the browser," Wang said. "We're inserting our layer of code at run-time to make the Web page safe for the end user."

More on eWeek.com

Tags: , , , , , , ,



Add/Read: Comments [1]
IT Security | Tech
Tuesday, 05 September 2006 09:29:11 (Pacific Standard Time, UTC-08:00)
#  Trackback

Referred by:
http://www.mycompletearticles.info/2012/04/09/Direct-Payday-... [Referral]
http://ritempdeso726.land.ru/ [Referral]
http://search.daum.net/ [Referral]
http://buyciprofloxacinnorx.com/ [Referral]
http://buymetronidazolenorx.com/ [Referral]
http://prowebmaking.com/user/Lossecycoab/ [Referral]
http://machinisten.net/memberlist.php?mode=viewprofile&u=195... [Referral]
http://www.articles4technology.info/ [Referral]
http://www.jeanstruereligion.org/ [Referral]
http://www.beatsbydreheadphonessale.net/ [Referral]
http://unlockiphonehowtounlockiphone.weebly.com/ [Referral]
http://aisha.springnote.com/pages/11157830?read=1 [Referral]
http://uiphone.shutterfly.com/ [Referral]
http://themastercleanse.org/ [Referral]
http://ainsleyainsley.beep.com/ [Referral]
http://www.upsaid.com/adelinealex/ [Referral]
http://unlockiphone112.blog.com/2012/03/31/how-to-unlock-iph... [Referral]
http://www.zimbio.com/member/AlanisAlanis/articles/bty03birI... [Referral]
http://my.opera.com/adrianaalexa/blog/2012/04/01/how-you-can... [Referral]
http://www.ziki.com/en/hugh-valencia-3+1118507/post/Backlink... [Referral]
http://customtshirtsti.insanejournal.com/ [Referral]

More...
Monday, 11 September 2006 03:34:37 (Pacific Standard Time, UTC-08:00)
Am I the only one to think that this could be the death knell for Internet Exploder? IE can't handle properly written pages reliably, so how will it behave once that code has been interfered with? I know this is only supposed to interfere with malicious code, but that is a little hard to define technically, isn't it?
Comments are closed.