Security and Protection in Information Processing Systems 2004
DOI: 10.1007/1-4020-8143-x_31
|View full text |Cite
|
Sign up to set email alerts
|

Recursive Sandboxes: Extending Systrace to Empower Applications

Abstract: The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We describe our extensions to systrace that allow sandboxed processes to further limit their children processes by issuing dynamically constructed policies. We discuss our extensions to the systrace daemon and the OpenBSD kernel, as well as a simple API for constructing simple policies. We present two separate implementations of our scheme,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Recursive sandboxes provides privilege attenuation in the child processes based on calls that the parent makes [27], thus enabling a process to voluntarily give up privileges.…”
Section: Related Workmentioning
confidence: 99%
“…Recursive sandboxes provides privilege attenuation in the child processes based on calls that the parent makes [27], thus enabling a process to voluntarily give up privileges.…”
Section: Related Workmentioning
confidence: 99%