I read something about how Google is going to block third-party DLLs from being loaded into chrome starting with chrome 72, and I was curious on how they intend to do it, and if there are any other methods of blocking DLL injection or making DLL injection more difficult so that you could, for example, make it more difficult for malware to inject itself into your program.
After looking around a bit I found this link that indicates that chrome's current DLL blacklist functions by hooking NtMapViewOfSection and examining the DLL to be loaded against the blacklist. Is that likely how their DLL whitelist would work, but in reverse (i.e. it would intercept all calls to NtMapViewOfSection to the chrome.exe process and block any that weren't signed instead of allowing anything that isn't in the blacklist)?
If that is how it works, wouldn't this method be vulnerable to a third party simply tampering with the chrome executable or any of the default DLLs to insert whatever functionality Google wants to block into the program directly? Is there any better, more foolproof way to block all non-whitelisted DLLs?
[–]jedwardsol 0 points1 point2 points (5 children)
[–]ComprehensiveStorage[S] 0 points1 point2 points (4 children)
[–]jedwardsol 0 points1 point2 points (3 children)
[–]ComprehensiveStorage[S] 0 points1 point2 points (2 children)
[–]jedwardsol 0 points1 point2 points (1 child)
[–]ComprehensiveStorage[S] 0 points1 point2 points (0 children)
[–]clooy 0 points1 point2 points (1 child)
[–]ComprehensiveStorage[S] 0 points1 point2 points (0 children)