Главная
Study mode:
on
1
Introduction
2
The Problem
3
Overview
4
Process Startup Stages
5
Concrete Example
6
Questions
7
Answering Questions
8
How do you protect against readbystand
9
Is lib sandbox distributed by distros
10
Can we use both approaches
11
How to include dynamic libraries
12
How to filter system calls
13
How to collect system calls
14
How to sandboxify a limit
15
Can you change allowed or blocked system calls
16
What happens when you try to sandbox an executable
17
Out of question
18
Outro
Description:
Explore Linux sandboxing techniques without writing code in this 49-minute conference talk by Ignat Korchagin from Cloudflare. Delve into the problem of process isolation, understand process startup stages, and examine a concrete example. Learn about protecting against readbystand, distributing lib sandbox, combining approaches, including dynamic libraries, filtering and collecting system calls, and setting sandbox limits. Discover how to modify allowed or blocked system calls and understand the implications of sandboxing executables. Gain valuable insights into enhancing security and process isolation in Linux environments through this informative presentation from the Linux Foundation.

Sandboxing in Linux with Zero Lines of Code

Linux Foundation
Add to list