OpenBSD Sponsors Work For Better Browser Security
Written by Michael Larabel in BSD on 2 March 2015 at 09:29 AM EST. 5 Comments
BSD --
The OpenBSD Foundation is supporting work to adapt at least one web browser's JIT engine to support OpenBSD's "Write Xor Execute" policy for system memory.

OpenBSD, the BSD distribution generally regarded as being very security-minded, supports a memory policy of W^X -- write xor execute where memory can be marked as writable or executable but not both, in order to fend off potential exploits. For those not familiar with OpenBSD's W^X implementation, there's an overview on Wikipedia. However, this memory policy is only advisory as JIT engines in browsers are among the big offenders and enforcing this policy would break their functionality.

As a result, the OpenBSD Foundation has contracted Ted Unangst to begin working on fixing at least one browser's just-in-time engine to support the W^X policy. This project just started so there isn't a whole lot to share right now, but you can learn more via this OpenBSD mailing list post.
Related News
About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter or contacted via MichaelLarabel.com.

Popular News This Week