A Survey on Application Sandboxing Techniques
| dc.contributor.author | Lauren Samuel | |
| dc.contributor.author | Rauti Sampsa | |
| dc.contributor.author | Leppänen Ville | |
| dc.contributor.organization | fi=ohjelmistotekniikka|en=Software Engineering| | |
| dc.contributor.organization | fi=tietojenkäsittelytiede|en=Computer Science| | |
| dc.contributor.organization-code | 1.2.246.10.2458963.20.71310837563 | |
| dc.contributor.organization-code | 2606803 | |
| dc.converis.publication-id | 28532802 | |
| dc.converis.url | https://research.utu.fi/converis/portal/Publication/28532802 | |
| dc.date.accessioned | 2022-10-28T13:57:24Z | |
| dc.date.available | 2022-10-28T13:57:24Z | |
| dc.description.abstract | <p>The principle of least privilege states that components in a system should only be allowed to perform<br />actions that are required for them to function. The wish to limit what programs can access has given rise to<br />a set of application-level sandboxing solutions. In this paper, we survey recent research on application-level<br />sandboxing. We discuss the properties of the major implementations and highlight the key differences between<br />them. In addition, we highlight how recent features in mainline Linux kernel have altered the sandboxing<br />landscape.<br /></p> | |
| dc.format.pagerange | 141 | |
| dc.format.pagerange | 148 | |
| dc.identifier.isbn | 978-1-4503-5234-5 | |
| dc.identifier.olddbid | 185418 | |
| dc.identifier.oldhandle | 10024/168512 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/42188 | |
| dc.identifier.url | https://dl.acm.org/citation.cfm?doid=3134302.3134312 | |
| dc.identifier.urn | URN:NBN:fi-fe2021042717954 | |
| dc.language.iso | en | |
| dc.okm.affiliatedauthor | Lauren, Samuel | |
| dc.okm.affiliatedauthor | Rauti, Sampsa | |
| dc.okm.affiliatedauthor | Leppänen, Ville | |
| dc.okm.discipline | 113 Computer and information sciences | en_GB |
| dc.okm.discipline | 113 Tietojenkäsittely ja informaatiotieteet | fi_FI |
| dc.okm.internationalcopublication | not an international co-publication | |
| dc.okm.internationality | International publication | |
| dc.okm.type | A4 Conference Article | |
| dc.publisher.country | United States | en_GB |
| dc.publisher.country | Yhdysvallat (USA) | fi_FI |
| dc.publisher.country-code | US | |
| dc.publisher.place | New York, NY | |
| dc.relation.conference | International Conference on Computer Systems and Technologies | |
| dc.relation.doi | 10.1145/3134302.3134312 | |
| dc.relation.ispartofseries | ACM International Conference Proceedings Series | |
| dc.relation.volume | 1369 | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/168512 | |
| dc.title | A Survey on Application Sandboxing Techniques | |
| dc.title.book | Proceedings of the 18th International Conference on Computer Systems and Technologies | |
| dc.year.issued | 2017 |
Tiedostot
1 - 1 / 1
Ladataan...
- Name:
- Sandboxing_Survey-1.pdf
- Size:
- 131.82 KB
- Format:
- Adobe Portable Document Format
- Description:
- Final draft