Abstract
Sandboxing is a popular technique that is used for safely executing untested code or testing un-trusted programs inside a secure environment. It can be employed at the operating system level or at the application level. In addition, it limits the level of access requested by the untested programs in the operating system by running them inside a secure environment. Therefore, any malicious or improperly coded programs that are aiming to damage hardware or software recourses will be prevented by the sandboxing. In this paper, we want to assess the effect of sandboxing on the system’s recourses utilization. We will examine and evaluate the operating system performance with Sandboxie, Bufferzone and Returnil sandboxes applications. Different performance parameters are considered, such as the execution time by the CPU for each sandbox and the read/write speed for various input output devices like memory and disks. Moreover, it is important to highlight that we have evaluated the mentioned sandboxing applications under the effect of having a virus that is attacking the operating system. We defined our own performance metrics that contain the most important parameters used in evaluating the related research work.
Original language | English |
---|---|
Pages (from-to) | 475-482 |
Number of pages | 8 |
Journal | Lecture Notes in Electrical Engineering |
Volume | 339 |
DOIs | |
State | Published - 2015 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2015.
Keywords
- Computer Security
- Operating System
- Sandboxing
ASJC Scopus subject areas
- Industrial and Manufacturing Engineering