A Survey on Application Sandboxing Techniques

dc.contributor.authorLauren Samuel
dc.contributor.authorRauti Sampsa
dc.contributor.authorLeppänen Ville
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organizationfi=tietojenkäsittelytiede|en=Computer Science|
dc.contributor.organization-code1.2.246.10.2458963.20.71310837563
dc.contributor.organization-code2606803
dc.converis.publication-id28532802
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/28532802
dc.date.accessioned2022-10-28T13:57:24Z
dc.date.available2022-10-28T13:57:24Z
dc.description.abstract<p>The principle of least privilege states that components in a system should only be allowed to perform<br />actions that are required for them to function. The wish to limit what programs can access has given rise to<br />a set of application-level sandboxing solutions. In this paper, we survey recent research on application-level<br />sandboxing. We discuss the properties of the major implementations and highlight the key differences between<br />them. In addition, we highlight how recent features in mainline Linux kernel have altered the sandboxing<br />landscape.<br /></p>
dc.format.pagerange141
dc.format.pagerange148
dc.identifier.isbn978-1-4503-5234-5
dc.identifier.olddbid185418
dc.identifier.oldhandle10024/168512
dc.identifier.urihttps://www.utupub.fi/handle/11111/42188
dc.identifier.urlhttps://dl.acm.org/citation.cfm?doid=3134302.3134312
dc.identifier.urnURN:NBN:fi-fe2021042717954
dc.language.isoen
dc.okm.affiliatedauthorLauren, Samuel
dc.okm.affiliatedauthorRauti, Sampsa
dc.okm.affiliatedauthorLeppänen, Ville
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.publisher.countryUnited Statesen_GB
dc.publisher.countryYhdysvallat (USA)fi_FI
dc.publisher.country-codeUS
dc.publisher.placeNew York, NY
dc.relation.conferenceInternational Conference on Computer Systems and Technologies
dc.relation.doi10.1145/3134302.3134312
dc.relation.ispartofseriesACM International Conference Proceedings Series
dc.relation.volume1369
dc.source.identifierhttps://www.utupub.fi/handle/10024/168512
dc.titleA Survey on Application Sandboxing Techniques
dc.title.bookProceedings of the 18th International Conference on Computer Systems and Technologies
dc.year.issued2017

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
Sandboxing_Survey-1.pdf
Size:
131.82 KB
Format:
Adobe Portable Document Format
Description:
Final draft