The presentation discusses various methods for improving application confinement and security, with a focus on achieving a level of confinement similar to that of Android applications.
- Shell type programs can be used to extract information and limit access to certain subsets of data
- Forced launchers can be used to override kernel settings and set up custom loaders for applications
- Code injection can be used to modify application behavior, but is not feasible for widespread use
- Address matching and control flow integrity can be used to modify application behavior without directly modifying the code
- The goal is to achieve tighter confinement for applications without burdening the user
- Dynamic data can be used to tighten security measures