A Study of Application Sandbox Policies in Linux

3Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Desktop operating systems, including macOS, Windows 10, and Linux, are adopting the application-based security model pervasive in mobile platforms. In Linux, this transition is part of the movement towards two distribution-independent application platforms: Flatpak and Snap. This paper provides the first analysis of sandbox policies defined for Flatpak and Snap applications, covering 283 applications contained in both platforms. First, we find that 90.1% of Snaps and 58.3% of Flatpak applications studied are contained by tamperproof sandboxes. Further, we find evidence that package maintainers actively attempt to define least-privilege application policies. However, defining policy is difficult and error-prone. When studying the set of matching applications that appear in both Flatpak and Snap app stores, we frequently found policy mismatches: e.g., the Flatpak version has a broad privilege (e.g., file access) that the Snap version does not, or vice versa. This work provides confidence that Flatpak and Snap improve Linux platform security while highlighting opportunities for improvement.

Cite

CITATION STYLE

APA

Dunlap, T., Enck, W., & Reaves, B. (2022). A Study of Application Sandbox Policies in Linux. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 19–30). Association for Computing Machinery. https://doi.org/10.1145/3532105.3535016

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free