6 CONCLUSION AND FUTURE
WORK
In this paper we introduced a method, how to use
UIDs, GIDs, and user NS to create a sandbox for
Linux desktops. The proposed sandbox is designed to
meet requirements that we consider to be important
for wide spread adoption. We implemented a proto-
type and performed a usability survey. The results
indicate that an easy to use, transparent sandbox will
likely be adopted, provided users understand the ben-
efits of using the software. Furthermore provided an
analysis of how the sandbox addresses each of the re-
quirements mentioned above, and analyzed its secu-
rity impact on the overall system.
Our research indicates several areas that future re-
search should address. First of all a long term evalu-
ation should be conducted to obtain results about the
applications stability. As mentioned above, the cur-
rent prototype does not support access control for the
D-Bus session bus. A solution to restrict this access,
is a necessary in our opinion. Another challenge for
future work is that Xorg does not separate the graph-
ical user interfaces of the applications. Therefore,
either a multi instance display server like Xpra or a
Wayland-based solution should be added. Third, cur-
rently network access is unrestricted. Isolating net-
work access through network namespaces should be
considered. The challenge here is to strike a balance
between full and no access – many applications use
localhost communication extensively.
REFERENCES
Agache, A., Brooker, M., Iordache, A., Liguori, A., Neuge-
bauer, R., Piwonka, P., and Popa, D.-M. (2020). Fire-
cracker: Lightweight virtualization for serverless ap-
plications. In 17th USENIX Symposium on Networked
Systems Design and Implementation (NSDI 20), pages
419–434, Santa Clara, CA. USENIX Association.
Anderson, R. (2020). Security engineering: a guide to
building dependable distributed systems. John Wiley
& Sons.
Android Open Source Project (2021). Android compatibil-
ity definition document. https://source.android.com/
compatibility/cdd.
Anjali, Caraza-Harter, T., and Swift, M. M. (2020). Blend-
ing containers and virtual machines: A study of
firecracker and gvisor. In Proceedings of the 16th
ACM SIGPLAN/SIGOPS International Conference
on Virtual Execution Environments, VEE ’20, page
101–113, New York, NY, USA. Association for Com-
puting Machinery.
Antoine Martin and others (2021). Xpra readme.
https://github.com/Xpra-org/xpra/blob/master/
README.md.
Badger, L., Sterne, D. F., Sherman, D. L., Walker, K. M.,
and Haghighat, S. A. (1996). A domain and type
enforcement unix prototype. Computing Systems,
9(1):47–83.
B
´
elair, M., Laniepce, S., and Menaud, J.-M. (2019). Lever-
aging kernel security mechanisms to improve con-
tainer security: A survey. In Proc. of the 14th Int.
Conf. on Availability, Reliability and Security. ACM.
Bell, D. E. (1975). Secure computer systems: Mathematical
foundations and model. Mitre Corp. Report, pages
74–244.
Biba, K. (1975). Integrity considerations for secure com-
puting systems. Mitre Report MTR-3153, Mitre Cor-
poration, Bedford, MA.
Brown, P., Blandford, J., Taylor, O., Untz, V., Bastian,
W., Lortie, A., Faure, D., and Thompson, W. (2020).
Desktop Entry Specification.
Canonical Ltd. (2022). Snap documentation — snapcraft
documentation. https://snapcraft.io/docs.
Containers Community (2016). Bubblewrap source code.
https://github.com/containers/bubblewrap.
ENCRYPTED SUPPORT LP (2022). Whonix. https:
//www.whonix.org/.
Firejail Contributers (2020). Firejail source code. https:
//github.com/netblue30/firejail.
Flatpak Team (2018). Flatpak’s documentation. https:
//docs.flatpak.org/en/latest/#.
Jana, S., Porter, D. E., and Shmatikov, V. (2011). TxBox:
Building secure, efficient sandboxes with system
transactions. In 2011 IEEE Symposium on Security
and Privacy. IEEE.
Khalimov, A., Benahmed, S., Hussain, R., Kazmi, S. A.,
Oracevic, A., Hussain, F., Ahmad, F., and Kerrache,
C. A. (2019). Container-based sandboxes for malware
analysis: A compromise worth considering. In Pro-
ceedings of the 12th IEEE/ACM International Confer-
ence on Utility and Cloud Computing, UCC’19, page
219–227, New York, NY, USA. Association for Com-
puting Machinery.
Linux Manpage Team (2021). Linux manual page.
Mayrhofer, R., Stoep, J. V., Brubaker, C., and Kralevich, N.
(2021). The android platform security model. ACM
Transactions on Privacy and Security, 24(3):1–35.
Open Container Initiative (2022). Runc source code. https:
//github.com/opencontainers/runc.
Subgraph (2014). Subgraph os. https://subgraph.com/.
The Qubes OS Project and others (2022). Architecture —
qubes os. https://www.qubes-os.org/doc/architecture/.
Waterson, D. (2020). Managing endpoints, the weakest link
in the security chain. Network Security, 2020(8):9–13.
Yosifovic, P., Ionescu, A., Russinovich, M. E., and
Solomon, D. A. (2017). Windows Internals Sev-
enth Edition Part 1: System architecture, processes,
threads, memory management, and more, Seventh
Edition. O’Reilly.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
324