1999
DOI: 10.21236/ada439735
|View full text |Cite
|
Sign up to set email alerts
|

Secure, User-level Resource-Constrained Sandboxing

Abstract: The popularity of mobile and networked applications has resulted in an increasing demand for execution "sandboxes"-environments that impose irrevocable qualitative and quantitative restrictions on resource usage. Existing approaches either verify application compliance to restrictions at start time (e.g., using certified code or language-based protection) or enforce it at run time (e.g., using kernel support, binary modification, or active interception of the application's interactions with the operating syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0
1

Year Published

2001
2001
2011
2011

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 35 publications
(36 citation statements)
references
References 16 publications
0
34
0
1
Order By: Relevance
“…With appropriate policy rules, the damage can be contained. Several levels of sandbox exist: kernel level [68], user level [69,70,71], or even hardware-supported sandboxing (e.g. Intel LaGrande [72], TCPA [73,74], TrustZone [75], Microsoft NGSCB [72], ChipLock [76], Bear [73].)…”
Section: Isolationmentioning
confidence: 99%
“…With appropriate policy rules, the damage can be contained. Several levels of sandbox exist: kernel level [68], user level [69,70,71], or even hardware-supported sandboxing (e.g. Intel LaGrande [72], TCPA [73,74], TrustZone [75], Microsoft NGSCB [72], ChipLock [76], Bear [73].)…”
Section: Isolationmentioning
confidence: 99%
“…Finally, while others have considered methods to instrument applications, to intercept requests for resources such as CPU cycles, memory, and bandwidth [Chang et al 2000], the emphasis of our ULS and SafeX work is to develop safe and predictable execution domains in which application-specific services may be deployed. Our work enables COTS systems to be extended with resource management methods to improve and/or guarantee qualities of service [Rajkumar et al 1998] to individual applications without the need for entire QoS architectures [Abdelzaher and Shin 1998;Rosu et al 1998] to be constructed.…”
Section: Related Workmentioning
confidence: 99%
“…These configurations are grouped into three categories, based on whether the mobile link L 2 exhibits cellular, infrared, or wireless LAN-like characteristics. Five of the configurations correspond to real hardware setups (tagged with a *), the remainder were emulated by restricting (via system call interception) CPU and network resources available to the application [1]. The computation power of different nodes is normalized to a 1 GHz Pentium III node.…”
Section: Effectiveness Of the Base Path Creation Algorithmmentioning
confidence: 99%
“…N 1 , N 2 , and L 1 are wired resources and consequently more capable of maintaining a certain minimum allocation (e.g., by employing additional geographically distributed resources) than the wireless link L 2 . The experiments were run on a wired network with the wireless link behavior emulated by controlling available bandwidth of the application via system call interception [1], as in some configurations in the web access experiment. In this experiment, an external module was used to inform the path about resource availability changes 3 .…”
Section: Planning For Value Rangesmentioning
confidence: 99%