Authors
David S Peterson, Matt Bishop, Raju Pandey
Publication date
2002
Conference
11th USENIX Security Symposium (USENIX Security 02)
Description
A widely used technique for securing computer systems is to execute programs inside protection domains that enforce established security policies. These containers, often referred to as sandboxes, come in a variety of forms. Although current sandboxing techniques have individual strengths, they also have limitations that reduce the scope of their applicability. In this paper, we give a detailed analysis of the options available to designers of sandboxing mechanisms. As we discuss the tradeoffs of various design choices, we present a sandboxing facility that combines the strengths of a wide variety of design alternatives. Our design provides a set of simple yet powerful primitives that serve as a flexible, general-purpose framework for confining untrusted programs. As we present our work, we compare and contrast it with the work of others and give preliminary results.
Total citations
200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024145771018101288796367346321
Scholar articles
DS Peterson, M Bishop, R Pandey - 11th USENIX Security Symposium (USENIX Security …, 2002