Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) 2007
DOI: 10.1109/acsac.2007.46
|View full text |Cite
|
Sign up to set email alerts
|

Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP

Abstract: Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process's privileges to the minimum. Sandboxing is designed to thwart such threats as (1) a program created by an attacker or (2) an input crafted to exploit a security vulnerability in a program. Examples of the later include input containing interpreted code or machine language to be injected via a buffer overflow.Traditionally, sandboxes are created by an invoking process. This is effective for (1) but onl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Sandboxes such as [27] and [29] generate a model to represent the sequence of system calls a program makes, and then if the program deviates from the model it prevents the action. Sandboxes such as [16], [28], and [43] extend this approach to not only look at the system calls a program makes, but to look at the effect they produce, such as the actions they take on files and registry keys; similarly, [38] extends this approach to dynamically sandbox programs based on the data, and source of the data, they access. Other research efforts go as far as running device drivers in a virtualized environment to improve system security and reliability [49].…”
Section: Related Workmentioning
confidence: 99%
“…Sandboxes such as [27] and [29] generate a model to represent the sequence of system calls a program makes, and then if the program deviates from the model it prevents the action. Sandboxes such as [16], [28], and [43] extend this approach to not only look at the system calls a program makes, but to look at the effect they produce, such as the actions they take on files and registry keys; similarly, [38] extends this approach to dynamically sandbox programs based on the data, and source of the data, they access. Other research efforts go as far as running device drivers in a virtualized environment to improve system security and reliability [49].…”
Section: Related Workmentioning
confidence: 99%
“…Sandboxing can be used to improve security of file access [10], analyze malicious codes [11], make sure the data written with no sensitive information [12], etc. Many studies have improved the traditional sandbox toward dissimilar emphases: sandbox executing speculative security checks [13], sandbox with a dynamic policy [14], dynamic sandbox quarantining untrusted entities [15], etc.…”
Section: B Sandboxmentioning
confidence: 99%