TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Advanced Persistent Threat You Have: Google Chrome [pdf]

42 pointsby epsylonover 9 years ago

8 comments

skybrianover 9 years ago
This seems like a good paper that isn't actually about something wrong with Chrome. It's about what security tools need to do to track auto-updating software.
epsylonover 9 years ago
&quot;Making of&quot; paper is here: <a href="http:&#x2F;&#x2F;www.netsq.com&#x2F;Documents&#x2F;MakingOfGoogleAPT.pdf" rel="nofollow">http:&#x2F;&#x2F;www.netsq.com&#x2F;Documents&#x2F;MakingOfGoogleAPT.pdf</a>
dkokelleyover 9 years ago
I found the paper very eye-opening, but perhaps I missed the &quot;moral&quot; of the story. I understand that Google&#x27;s auto updater can behave similarly to a malicious utility by an APT, but what recourse or mitigation techniques are available? According to the paper, each step individually is indistinguishable from benign activity. Techniques for identifying the end result of the activity and flagging it as suspicious are omitted (or perhaps I missed them).
sjg007over 9 years ago
Presumably Chrome and its updater are digitally signed... not that that stops malware but at least it is another layer.
RachelFover 9 years ago
Others are dumping Chrome for similar reasons: <a href="http:&#x2F;&#x2F;www.extremetech.com&#x2F;computing&#x2F;210576-why-im-dumping-google-chrome" rel="nofollow">http:&#x2F;&#x2F;www.extremetech.com&#x2F;computing&#x2F;210576-why-im-dumping-g...</a>
iricktover 9 years ago
The paper is dated 18-Apr-2012
NickHaflingerover 9 years ago
total FUD .. nothing gets updated here unless I want it to. And why isn&#x27;t the Microsoft software updater or your AV updater considered an equal threat. Who paid for this &#x27;study&#x27;.
xpaulbettsxover 9 years ago
I can&#x27;t read through the pages and pages of grandstanding in this PDF, does this at all have some sort of escape of a security boundary, or is it just &quot;I found a weird way to hack myself&quot;?
评论 #10125161 未加载
评论 #10126170 未加载