Title :
FlexBox: Sandboxing internet servers based on layer-7 contexts
Author :
Tanoue, Ayumu ; Shimamura, Makoto ; Hanaoka, Miyuki ; Kono, Kenji
Author_Institution :
Dept. of Inf. & Comput. Sci., Keio Univ., Tokyo
Abstract :
Internet servers are constantly exposed to malicious attacks launched remotely. Sandbox is a promising approach to reducing the damage caused by malicious attacks. A sandbox system provides a restricted environment for executing programs/codes from an Internet server, in which the accessible resources are limited to those required for legal execution. However, traditional sandbox systems are not suitable for preventing sensitive files, legally accessed by Internet servers, from being leaked or tampered. A sandbox system must permit access to sensitive files if the sandboxed server requires access to them. This paper presents FlexBox, a novel sandbox system that reduces the possibility of leaking or tampering with sensitive files accessed by Internet servers. The key observation is that Internet servers typically have several execution states, each of which requires different access rights to resources such as files, especially sensitive files that are usually accessed only in a few execution states. Therefore, if FlexBox dynamically changes a set of accessible files according to serverspsila execution states, it is expected to dramatically reduce the possibility of information leakage/tampering. To obtain the execution states of Internet servers, FlexBox exploits the layer-7 contexts of Internet servers, i.e., it monitors the network messages exchanged between the server and clients. We demonstrate that FlexBox can be applied to several real Internet servers and the overhead from FlexBox is reasonably low.
Keywords :
Internet; network servers; security of data; FlexBox; Internet servers; information leakage-tampering; layer-7 contexts; legal execution; malicious attacks; sandbox system; sandboxing; sensitive files; Authorization; Computer science; File servers; Information security; Internet; Law; Legal factors; Network servers; Permission; Web server;
Conference_Titel :
Computers and Communications, 2008. ISCC 2008. IEEE Symposium on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-2702-4
Electronic_ISBN :
1530-1346
DOI :
10.1109/ISCC.2008.4625645