Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป A Flexible Containment Mechanism for Executing Untrusted Code
Tweet

connect with us

A Flexible Containment Mechanism for Executing Untrusted Code

Abstract: 

A widely used technique for securing computer systems is to execute programs inside protection domains that enforce established security policies. These containers, often referred to as sandboxes, come in a variety of forms. Although current sandboxing techniques have individual strengths, they also have limitations that reduce the scope of their applicability. In this paper, we give a detailed analysis of the options available to designers of sandboxing mechanisms. As we discuss the tradeoffs of various design choices, we present a sandboxing facility that combines the strengths of a wide variety of design alternatives. Our design provides a set of simple yet powerful primitives that serve as a flexible, general-purpose framework for confining untrusted programs. As we present our work, we compare and contrast it with the work of others and give preliminary results.

David S. Peterson, University of California, Davis

Matt Bishop, University of California, Davis

Raju Pandey, University of California, Davis

BibTeX
@inproceedings {270568,
author = {David S. Peterson and Matt Bishop and Raju Pandey},
title = {A Flexible Containment Mechanism for Executing Untrusted Code},
booktitle = {11th USENIX Security Symposium (USENIX Security 02)},
year = {2002},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/11th-usenix-security-symposium/flexible-containment-mechanism-executing-untrusted-code},
publisher = {USENIX Association},
month = aug,
}
Download

Links

Paper: 
http://www.usenix.org/events/sec02/full_papers/peterson/peterson.pdf
Paper (HTML): 
http://www.usenix.org/events/sec02/full_papers/peterson/peterson_html/index.html
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us