Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014
…
2 pages
1 file
In this work an analysis of the sandbox features offered by Comodo Internet security was performed. The features such as Virtual Desktop as well as running the browser in a sandboxed environment were reviewed and tested by means of a deliberate interaction with malicious software.
2001
Abstract Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such as JavaScript, only to switch them back on in order to view a certain site or read a particular message. Users of Unix (or similar) systems can construct a sandbox where such programs execute in a restricted environment.
PeerJ Computer Science, 2016
Sandboxes are increasingly important building materials for secure software systems. In recognition of their potential to improve the security posture of many systems at various points in the development lifecycle, researchers have spent the last several decades developing, improving, and evaluating sandboxing techniques. What has been done in this space? Where are the barriers to advancement? What are the gaps in these efforts? We systematically analyze a decade of sandbox research from five top-tier security and systems conferences using qualitative content analysis, statistical clustering, and graph-based metrics to answer these questions and more. We find that the term “sandbox” currently has no widely accepted or acceptable definition. We use our broad scope to propose the first concise and comprehensive definition for “sandbox” that consistently encompasses research sandboxes. We learn that the sandboxing landscape covers a range of deployment options and policy enforcement te...
International Journal of Science and Research (IJSR) ISSN: 2319-7064, 2024
This paper examines the deployment of the Trellix sandbox in inline mode to enhance network security within critical infrastructure environments. The primary objective of this study is to evaluate the sandbox's real time threat detection and mitigation capabilities while ensuring minimal impact on network performance. Performance metrics, including latency, false positive rates, and detection accuracy, were collected during both normal and high traffic scenarios. The results demonstrate a significant improvement in threat detection with minimal latency, underscoring the effectiveness of inline sandbox deployment for organizations managing sensitive and critical data.
Malwares are one of the most dangerous security threats in today's world of fast growing technology. Now, it is not impossible to remotely lock down a system's files for ransoms even when it is located overseas. This threat was accelerated when the world was introduced to cryptocurrency (for e.g., Bitcoins). It allowed the attackers to hide their tracks more efficiently. From a simple idea of testing the efficiency of a computer system to the most critical and sophisticated cyber-attack, malwares has evolved over the years and appeared time to time. Even with the smartest technologies today where we are trying to include Machine learning and Deep learning to every field of our life, the attackers are already developing more sophisticated malwares using the same Machine learning and Deep learning techniques. This raises the question on the security of the cyber-world and how we are able to protect it. In this work, we are presenting an analysis on a recent and most critical Windows malware called "LockerGoga". Both static and dynamic analyses are performed on the malware to understand the behavior and characteristics of the malware.
2020
Deploying the appropriate digital environment for conducting cybersecurity exercises can be challenging and typically requires a lot of effort and system resources. Usually, for deploying vulnerable webservices and setting up labs for hands-on cybersecurity exercises to take place, more configuration is required along with technical expertise. Containerization techniques and solutions provide less overhead and can be used instead of virtualization techniques to revise the existing approaches. Furthermore, it is important to sandbox or replicate existing systems or services for the cybersecurity exercises to be realistic. To address such challenges, we conducted a performance evaluation of some of the existing deployment techniques to analyze their benefits and drawbacks. We tested techniques relevant to containerization or MicroVMs that include less overhead instead of the regular virtualization techniques to provide meaningful and comparable results from the deployment of scalable solutions, demonstrating their benefits and drawbacks. Finally, we presented a use case for deploying cybersecurity exercises that requires less effort and moderate system resources and an approach for monitoring the progress of the participants using a host-based intrusion system.
2006
Comparing the system call sequence of a network appli- cation against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits such software vulnerabilities as buffer overflow to take over the control of a victim application and pos- sibly the underlying machine. The long-standing techni- cal barrier to the acceptance of this system call monitor- ing approach is how to derive accurate sandboxing poli- cies for Windows applications whose source code is un- available. In fact, many commercial computer security companies take advantage of this fact and fashion a busi- ness model in which their users have to pay a subscription fee to receive periodic updates on the application sandbox- ing policies, much like anti-virus signatures. This paper describes the design, implementation and evaluation of a sandboxing system called BASS that can automatically ex- tract a highly accurate application-specific sandboxing pol- icy from a Win32/X...
2011 IEEE Symposium on Security and Privacy, 2011
TXBOX is a new system for sandboxing untrusted applications. It speculatively executes the application in a system transaction, allowing security checks to be parallelized and yielding significant performance gains for techniques such as on-access anti-virus scanning. TXBOX is not vulnerable to TOCTTOU attacks and incorrect mirroring of kernel state. Furthermore, TXBOX supports automatic recovery: if a violation is detected, the sandboxed program is terminated and all of its effects on the host are rolled back. This enables effective enforcement of security policies that span multiple system calls.
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits such software vulnerabilities as buffer overflow to take over the control of a victim application and possibly the underlying machine. The long-standing technical barrier to the acceptance of this system call monitoring approach is how to derive accurate sandboxing policies for Windows applications whose source code is unavailable. In fact, many commercial computer security companies take advantage of this fact and fashion a business model in which their users have to pay a subscription fee to receive periodic updates on the application sandboxing policies, much like anti-virus signatures. This paper describes the design, implementation and evaluation of a sandboxing system called BASS 1 that can automatically extract a highly accurate application-specific sandboxing policy from a Win32/X86 binary, and enforce the extracted policy at run time with low performance overhead. BASS is built on a binary interpretation and analysis infrastructure called BIRD, which can handle application binaries with dynamically linked libraries, exception handlers and multi-threading, and has been shown to work correctly for a large number of commercially distributed Windows-based network applications, including IIS and Apache. The throughput and latency penalty of BASS for all the applications we have tested except one is under 8%.
Annals of the Náprstek Museum, 2024
Encyclopedia of law and economics, 2000
Open Archaeology, 2022
AFRICAN JOURNAL OF AGRICULTURAL RESEEARCH, 2012
SIBIC 2022
arXiv (Cornell University), 2018
Emirates Journal of Food and Agriculture, 2015
Journal of Food Biochemistry, 1996
Dialect, Culture, and Society in Eastern Arabia, Volume III: Phonology, Morphology, Syntax, Style, 2016
JMIR mHealth and uHealth, 2021
Revista Latinoamericana de Etnomatemática, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2005