SlideShare a Scribd company logo
SANDBOX TECHNOLOGY
Running Untrusted
Application Code
Rohit Jain
Ayush Gupta
INDEX
• What is Sandbox?
• How does it work?
• Features ,Types & Examples
• How to Sandbox any program
• W/O Sandbox
• Virus scanner VS Sandbox
• Summary
The term security always plays an
important role in our lives ,where it is the
age of computers so security plays an
even bigger role.
The latest and most sophisticated
technology emerged over the years is
Sand Box technology.
INTRODUCTION
Sandboxing is a popular technique for
creating confined execution
environments,
which could be used for running
untrusted programs.
RUNNING UNTRUSTED CODE
• We often need to run buggy/untrusted code:
–programs from untrusted Internet sites
•toolbars, viewers, codecs for media player
–old or insecure applications: ghost view, outlook
–legacy softwares
• Goal: if application “misbehaves,” kill it.
FEATURES OF SANDBOX
• User friendly It can detect unknown viruses with a
minimal risk of false alarms.
• Provides a platform to test malwares and other risky
piece of codes.
• Much of the code your devices run every day is already
sandboxed for your protection
EXAMPLES
• Web Pages: Your browser essentially sandboxes the web pages
it loads. Web pages can run JavaScript code, but this code can’t
do anything it wants — if JavaScript code tries to access a local
file on your computer, the request will fail.
• PDFs and Other Documents: Adobe Reader now runs PDF
files in a sandbox, preventing them from escaping the PDF
viewer and tampering with the rest of your computer. Microsoft
Office also has a sandbox mode to prevent unsafe macros from
harming your system.
EXAMPLES
• Mobile Apps: Mobile platforms run their apps in a
sandbox. Apps for iOS, Android, and Windows 8 are
restricted from doing many of the things standard
desktop applications can do.
• Windows Programs: User Account Control functions as
a bit of a sandbox, essentially restricting Windows
desktop applications from modifying system files
without first asking you permission. User Account
Control just restricts access to system files and system-
wide settings.
VIRUS SCANNERS VS SANDBOX
• Sand Box scans the actions the virus code takes and
not the name or characteristics of the virus. where the
virus scanners have can only inform you and remove
the type of virus you have .
• Sandbox cannot replace anti-virus scanners as
identification, disinfection and removal of viruses can
only be done by virus scanners.
• Both work complementary to each others for
providing a fully secured environment .
HOW TO SANDBOX ANY PROGRAM
• Virtual Machines: A virtual machine program
like VirtualBox or VMware creates virtual hardware
devices that it uses to run an operating system. This
entire operating system is essentially sandboxed, as it
doesn’t have access to anything outside of the virtual
machine.
• Using other tools: Sandboxie, Bufferzone
WITHOUT SANDBOX ?
If the sandbox agent does not protect your computer, hostile
applets could access all the files and resources that are available
on your computer.
Recently corporate networks and computers connects to the
internet have been attacked and have reported damages from
illegal access from the outside.
Malicious mobile code (active x, java, vb script as well as other
executables ) is increasingly being used to issue these attacks.
without sophisticated knowledge like sandbox the rate of threats
increases enormously.
Sandbox
TYPES OF APPLICATION SANDBOXES
• Type A: OS enhancement based: Sandboxie,
Buffer Zone Pro etc.
• Type B: Master/slave model: Adobe ReaderX,
Chrome browser
TYPE A
Examples:
Sand boxie (available since 2006), BufferZone
• Custom kernel driver modifies Windows behavior, so that
change to protected system components is prevented
• Use cases: Most of such sandboxes are used for controlled
execution of applications
TYPE B
•Example: Google Chrome ,Adobe
Reader
•Slave is confined using OS access
control facilities
•Master mediates access to resources
•Use case: protect the application from
exploitation
SUMMARY
• Sandboxing is a tried and true technique for running
risky applications or visiting potentially dangerous web
sites.
• Sanbox is vulnerable.
• Security should always be multi-layered, so you should
not rely on the sandboxed environment, by itself, to
provide complete protection.

More Related Content

PPTX
malware analysis
PPT
Sandbox Technology in AntiVirus
PPTX
Dhcp server configuration
PPTX
Secure communication
PDF
Virtual box
PPTX
Understanding android security model
PDF
[9] Firewall.pdf
PPTX
Kali linux and hacking
malware analysis
Sandbox Technology in AntiVirus
Dhcp server configuration
Secure communication
Virtual box
Understanding android security model
[9] Firewall.pdf
Kali linux and hacking

What's hot (20)

PPTX
Honeypots
PPT
Silverlight
PDF
IOT Security
PDF
Cloud Security: A New Perspective
PPTX
Cloud security ppt
PPTX
Chap 6 cloud security
PPT
Intrusion detection system ppt
PPTX
Five Major Types of Intrusion Detection System (IDS)
PPT
IDS and IPS
PPTX
Cloud security Presentation
PPTX
PPT
DDoS Attack PPT by Nitin Bisht
PPTX
cloud computing ppt
PPTX
Virtualization security threats in cloud computing
PPT
Wireless security presentation
PPTX
Packet sniffers
PDF
Evolution of Cloud Computing
PPT
Cloud deployment models
PPTX
Ethical hacking : Its methodologies and tools
Honeypots
Silverlight
IOT Security
Cloud Security: A New Perspective
Cloud security ppt
Chap 6 cloud security
Intrusion detection system ppt
Five Major Types of Intrusion Detection System (IDS)
IDS and IPS
Cloud security Presentation
DDoS Attack PPT by Nitin Bisht
cloud computing ppt
Virtualization security threats in cloud computing
Wireless security presentation
Packet sniffers
Evolution of Cloud Computing
Cloud deployment models
Ethical hacking : Its methodologies and tools
Ad

Viewers also liked (6)

PPTX
Security in Data Communication and Networking
PPT
Lecture 8 mail security
PPTX
Kerberos Authentication Protocol
PPT
Email security
PPTX
Email security - Netwroking
Security in Data Communication and Networking
Lecture 8 mail security
Kerberos Authentication Protocol
Email security
Email security - Netwroking
Ad

Similar to Sandbox (20)

PPTX
Sandboxing - Malware detection.pptx
PPTX
Rafal Wojtczuk - Endpoint security via Application sandboxing and virtualizat...
PPTX
Penetration Testing ethical pen testing.pptx
PPT
Auto sanbox technology a complete overview
PPT
Making the case for sandbox v1.1 (SD Conference 2007)
PDF
Derbycon Bromium Labs: Sandboxes
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
Sandbox Testing: Enhancing Security and Reliability in Software Development
PPT
Blackhat EU 2011 - Practical Sandboxing
PPT
Hack In Paris 2011 - Practical Sandboxing
PPTX
CS155 Computer Security at Stanford University
PPTX
Application Explosion How to Manage Productivity vs Security
PPT
Google chrome sandbox
PDF
Thick Application Penetration Testing - A Crash Course
PDF
Sandboxing
PPT
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
PDF
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
PPTX
Application Whitelisting - Complementing Threat centric with Trust centric se...
PPTX
Fortinet sandboxing
PDF
How to Help Your Customers Protect Themselves from Ransomware Attacks
Sandboxing - Malware detection.pptx
Rafal Wojtczuk - Endpoint security via Application sandboxing and virtualizat...
Penetration Testing ethical pen testing.pptx
Auto sanbox technology a complete overview
Making the case for sandbox v1.1 (SD Conference 2007)
Derbycon Bromium Labs: Sandboxes
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox Testing: Enhancing Security and Reliability in Software Development
Blackhat EU 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical Sandboxing
CS155 Computer Security at Stanford University
Application Explosion How to Manage Productivity vs Security
Google chrome sandbox
Thick Application Penetration Testing - A Crash Course
Sandboxing
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Application Whitelisting - Complementing Threat centric with Trust centric se...
Fortinet sandboxing
How to Help Your Customers Protect Themselves from Ransomware Attacks

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Monthly Chronicles - July 2025
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction

Sandbox

  • 2. INDEX • What is Sandbox? • How does it work? • Features ,Types & Examples • How to Sandbox any program • W/O Sandbox • Virus scanner VS Sandbox • Summary
  • 3. The term security always plays an important role in our lives ,where it is the age of computers so security plays an even bigger role. The latest and most sophisticated technology emerged over the years is Sand Box technology.
  • 4. INTRODUCTION Sandboxing is a popular technique for creating confined execution environments, which could be used for running untrusted programs.
  • 5. RUNNING UNTRUSTED CODE • We often need to run buggy/untrusted code: –programs from untrusted Internet sites •toolbars, viewers, codecs for media player –old or insecure applications: ghost view, outlook –legacy softwares • Goal: if application “misbehaves,” kill it.
  • 6. FEATURES OF SANDBOX • User friendly It can detect unknown viruses with a minimal risk of false alarms. • Provides a platform to test malwares and other risky piece of codes. • Much of the code your devices run every day is already sandboxed for your protection
  • 7. EXAMPLES • Web Pages: Your browser essentially sandboxes the web pages it loads. Web pages can run JavaScript code, but this code can’t do anything it wants — if JavaScript code tries to access a local file on your computer, the request will fail. • PDFs and Other Documents: Adobe Reader now runs PDF files in a sandbox, preventing them from escaping the PDF viewer and tampering with the rest of your computer. Microsoft Office also has a sandbox mode to prevent unsafe macros from harming your system.
  • 8. EXAMPLES • Mobile Apps: Mobile platforms run their apps in a sandbox. Apps for iOS, Android, and Windows 8 are restricted from doing many of the things standard desktop applications can do. • Windows Programs: User Account Control functions as a bit of a sandbox, essentially restricting Windows desktop applications from modifying system files without first asking you permission. User Account Control just restricts access to system files and system- wide settings.
  • 9. VIRUS SCANNERS VS SANDBOX • Sand Box scans the actions the virus code takes and not the name or characteristics of the virus. where the virus scanners have can only inform you and remove the type of virus you have . • Sandbox cannot replace anti-virus scanners as identification, disinfection and removal of viruses can only be done by virus scanners. • Both work complementary to each others for providing a fully secured environment .
  • 10. HOW TO SANDBOX ANY PROGRAM • Virtual Machines: A virtual machine program like VirtualBox or VMware creates virtual hardware devices that it uses to run an operating system. This entire operating system is essentially sandboxed, as it doesn’t have access to anything outside of the virtual machine. • Using other tools: Sandboxie, Bufferzone
  • 11. WITHOUT SANDBOX ? If the sandbox agent does not protect your computer, hostile applets could access all the files and resources that are available on your computer. Recently corporate networks and computers connects to the internet have been attacked and have reported damages from illegal access from the outside. Malicious mobile code (active x, java, vb script as well as other executables ) is increasingly being used to issue these attacks. without sophisticated knowledge like sandbox the rate of threats increases enormously.
  • 13. TYPES OF APPLICATION SANDBOXES • Type A: OS enhancement based: Sandboxie, Buffer Zone Pro etc. • Type B: Master/slave model: Adobe ReaderX, Chrome browser
  • 14. TYPE A Examples: Sand boxie (available since 2006), BufferZone • Custom kernel driver modifies Windows behavior, so that change to protected system components is prevented • Use cases: Most of such sandboxes are used for controlled execution of applications
  • 15. TYPE B •Example: Google Chrome ,Adobe Reader •Slave is confined using OS access control facilities •Master mediates access to resources •Use case: protect the application from exploitation
  • 16. SUMMARY • Sandboxing is a tried and true technique for running risky applications or visiting potentially dangerous web sites. • Sanbox is vulnerable. • Security should always be multi-layered, so you should not rely on the sandboxed environment, by itself, to provide complete protection.