An intriguing report by the Financial Times discusses how Shape Security, a Google-backed venture, is using shape-shifting code to outsmart hackers. Real-time polymorphism could revolutionize cyber security, attracting investors from major tech companies like Facebook, LinkedIn, Twitter, and DropBox.
On Shape Security's Technology page, they demonstrate how traditional HTML forms can be dynamically transformed to prevent hacking attempts:
<form action="login_form.php">
<input id="username" name="username"/>
<input id="password" name="password"/>
<input id="rememberMe" name="rememberMe"/>
<input id="login" name="login"/>
<input type="submit"/>
</form>
This transformation changes the binding names on each request, as shown in the example below:
<form action="d94M2eQgBK">
<input id="v6DbNQEs4z" name="dtTtA6tsmi"/>
<input id="b5KbBSjCT6" name="rWttCLcv3f"/>
<input id="zQNA3ZBgKz" name="R2bHEe3taV"/>
<input id="rvnFbpxKwN" name="HNnQwnUbtm"/>
<input type="submit"/>
</form>
As we explore the implications of real-time polymorphism in AngularJS, it becomes clear that adapting variable names at both the html and javascript levels presents unique challenges. The introduction of a directive like ng-polymorph-model
may help manage this complexity, yet stability remains a concern for potential security vulnerabilities.
The approach taken by AngularJS experts towards real-time polymorphism will likely shape the future of dynamic web security measures.