Title | ||
---|---|---|
Sandboxing of biomedical applications in Linux containers based on system call evaluation. |
Abstract | ||
---|---|---|
Applications for biomedical data processing often integrate external libraries and frameworks for common algorithmic tasks. It typically reduces development time and increases overall code quality. With the introduction of lightweight container-based virtualization, the bundling of applications and their required dependencies has become feasible, and containers can be transferred and executed in distributed environments. However, the incorporation of unreviewed code poses a security threat as it might contain malicious components. In this paper, measures to minimize risks of untrusted application execution are presented. Based on the system calls issued during sample execution of the application, both the container itself and the container runtime configuration are restricted to the set of actions the application requires. It is shown that the employed security measures are suited to counteract different attacks while application runtime is not affected. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1002/cpe.4484 | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Keywords | Field | DocType |
application analysis,process supervision,sandboxing,system call interception | Sandbox (computer security),Computer science,Process supervision,System call,Operating system,Distributed computing | Journal |
Volume | Issue | ISSN |
30 | SP12 | 1532-0626 |
Citations | PageRank | References |
1 | 0.43 | 10 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Witt | 1 | 3 | 2.59 |
Christoph Jansen | 2 | 11 | 4.86 |
Dagmar Krefting | 3 | 2 | 2.21 |
Achim Streit | 4 | 1067 | 109.13 |