Sandboxing Adoption in Open Source Ecosystems (2405.06447v2)
Abstract: Sandboxing mechanisms allow developers to limit how much access applications have to resources, following the least-privilege principle. However, it's not clear how much and in what ways developers are using these mechanisms. This study looks at the use of Seccomp, Landlock, Capsicum, Pledge, and Unveil in all packages of four open-source operating systems. We found that less than 1% of packages directly use these mechanisms, but many more indirectly use them. Examining how developers apply these mechanisms reveals interesting usage patterns, such as cases where developers simplify their sandbox implementation. It also highlights challenges that may be hindering the widespread adoption of sandboxing mechanisms.
- Comparing the usability of cryptographic APIs. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 154–171.
- Understanding developers’ privacy and security mindsets via climate theory. Empirical Software Engineering 26 (2021), 1–43.
- Bob Beck. 2019. Pledge and Unveil in OpenBSD. Open BSD project (2019).
- David Calavera and Lorenzo Fontana. 2019. Linux Observability with BPF: Advanced Programming for Performance Analysis and Networking. O’Reilly Media.
- Domain Page-Table Isolation. arXiv preprint arXiv:2111.10876 (2021).
- Deno. 2023. Deno permissions. Deno documentation (2023).
- Alexander J DeWitt and Jasna Kuljis. 2006. Aligning usability and security: a usability study of Polaris. In Proceedings of the second symposium on Usable privacy and security. 1–7.
- Alexander John Anthony George DeWitt. 2007. Usability issues with security of electronic mail. Ph. D. Dissertation. Brunel University, School of Information Systems, Computing and Mathematics.
- Stack overflow considered harmful? the impact of copy&paste on android application security. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 121–136.
- Matthew Green and Matthew Smith. 2016. Developers are not the enemy!: The need for usable security APIs. IEEE Security & Privacy 14, 5 (2016), 40–46.
- Aleksey Kurchuk and Angelos D Keromytis. 2004. Recursive sandboxes: Extending systrace to empower applications. In Security and Protection in Information Processing Systems: IFIP 18 th World Computer Congress TC11 19 th International Information Security Conference 22–27 August 2004 Toulouse, France. Springer, 473–487.
- A systematic analysis of the science of sandboxing. PeerJ Computer Science 2 (2016), e43.
- OpenBSD documentation. 2021. Unveil system call documentation in OpenBSD. OpenBSD project (2021).
- OpenBSD documentation. 2022. Pledge system call documentation in OpenBSD. OpenBSD project (2022).
- Usability Smells: An Analysis of {{\{{Developers’}}\}} Struggle With Crypto Libraries. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 245–257.
- Omar Polo. 2021. Comparing sandboxing techniques. https://www.omarpolo.com/post/gmid-sandbox.html
- Mickaël Salaün. 2017. Landlock LSM: toward unprivileged sandboxing. Linux Security Summit (2017).
- J.H. Saltzer and M.D. Schroeder. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep 1975), 1278–1308. https://doi.org/10.1109/PROC.1975.9939
- Towards usable application-oriented access controls: qualitative results from a usability study of SELinux, AppArmor and FBAC-LSM. International Journal of Information Security and Privacy (IJISP) 6, 1 (2012), 57–76.
- The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. Computers & Security 32 (2013), 219–241.
- Schrödinger’s security: opening the box on app developers’ security rationale. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 149–160.
- Capsicum: practical capabilities for UNIX. In 19th USENIX Security Symposium. 17.
- Quantifying developers’ adoption of security tools. In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. 260–271.
- Ka-Ping Yee. 2004. Aligning security and usability. IEEE Security & Privacy 2, 5 (2004), 48–55.
- Mariusz Zaborski. 2016. Capsicum and casper-a fairy tale about solving security problems.
Collections
Sign up for free to add this paper to one or more collections.