Your SlideShare is downloading. ×
Sandbox – Online, Offline
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Sandbox – Online, Offline

3,313

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,313
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
28
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Sandbox – Online, Offline
    By Pushkar
    Null-The Open Secuirty Community
  • 2. Sandbox…
    Sandbox may refer to:
    Limited, restricted environment for a specific purpose
    Litter box, an indoor box for cats to relieve themselves
    Sandpit or sandbox, a wide, shallow playground construction to hold sand often made of wood or plastic
    Sandbox (railways), a container that holds sand for use in improving rail adhesion in slippery conditions
    Sandboxing is a popular technique for creating confined execution environments, which could be be used for running untrusted programs. A sandbox limits, or reduces, the level of access its applications have — it is a container
  • 3. Sandbox…
    Sandbox (computer security), a virtual container in which untrusted programs can be safely run
    Sandbox (software development), an online environment in which code or content changes can be tested without affecting the original system
    Sandbox Effect, in Google Internet search rankings
  • 4. How it works…
    Basic two mechanism…
    Namespace isolation
    - agents are unable to manipulate resources that they cannot name.
    Access checks
    - discharge proof obligations of the form “agent A may manipulate resource R by method M“
    Intercepting System calls
    Deny the system call, Audit the system call's invocation, Pre- process the arguments, Post-process the result, Replace the system call's implementation
  • 5. Limitations…
    Sandboxing implementations suffer from five broad kinds of limitation:
    too much isolation
    not enough isolation
    non-portability
    non-usability
    design and implementation failures
  • 6. Google Sandbox…
    Sandbox Effect,
    Technique that google
    uses to ran new website
    in its search results
    Check whether it is a
    genuine or a spam
    website
  • 7. Others…
    Wikipedia Sandbox
    http://en.wikipedia.org/wiki/Wikipedia:Sandbox
    MySQL Sandbox
    http://en.wikipedia.org/wiki/Wikipedia:Sandbox
    Chrome
    http://dev.chromium.org/developers/design-documents/sandbox.
  • 8. Malware Analysis…
    Online
    Anubis http://anubis.iseclab.org/
    BitBlaze https://aerie.cs.berkeley.edu/
    Comodo Instant Malware Analysis 
    http://camas.comodo.com/
    Eureka http://eureka.cyber-ta.org/
    JoeBox http://www.joebox.org/submit.php
    Norman Sandbox
     http://www.norman.com/security_center/security_tools/submit_file/en
    Sunbelt Sandbox: 
    http://www.sunbeltsecurity.com/sandbox/
    ThreatExpert http://www.threatexpert.com/
    Xandora http://www.xandora.net/xangui/
  • 9. Offline…
    Sandboxie http://www.sandboxie.com/index.php?DownloadSandboxie
    Autovin http://autovin.pandasecurity.my/
    IDefenseLabs SysAnalyzer http://labs.idefense.com/software/
    MandiantMemoryze, Red Curtain http://www.mandiant.com/products/free_software
     
  • 10. Additional Tools…
    Buster Sandbox Analyzer http://bsa.isoftware.nl/
    Malware Analyser 2.8 : http://code.google.com/p/malwareanalyzer/
  • 11. Lets check…
  • 12. Thank you…Q&A ????

×