Sandboxing: Isolating Browsers

What exactly is Sandboxing?

Sandboxing is the process of separating an application like a browser for the web or any other piece of code within a secure environment. Sandboxing’s goal is usually to improve security. Companies use sandboxing to serve many different purposes such as application sandboxing, web browser sandboxing and email security Sandboxing.

An application sandbox allows you to run software that is not trusted in a secure location and monitor it for malware-related components. A browser sandbox for the web lets users run browser applications in isolated settings, in order to stop browser-based malware from spreading across the network. A security sandbox for email lets you examine and evaluate email-based threats in a safe and secure setting.

Sandbox Use Cases

There are three primary scenarios for running applications in a Sandbox:

Application Sandbox–there are applications that permit users to run non-trusted software in a sandbox to stop it from accessing personal information or causing damage to the device. The sandbox functions as the complete computer system therefore, the software is unable to recognize that it is operating in an isolated virtual world.

Sandbox browser: You can use a reliable web browser within an Sandbox. If a malicious web site or file exploits weaknesses in the browser for web and causes damage, it’s limited to the Sandbox. The process of detonation may assist in the discovery of new vulnerabilities and fix them on real-world browsers.

Security sandboxes – Security solutions employ the sandbox to find malicious software. Traditional sandboxes employ behavior-based analysis that detonates links and files and then analyzes the behavior. The latest generation of sandboxes utilize advanced technology that scan the content for dangers at the CPU/memory levels and can detect threats in a precise way.

Application Sandboxing

Application sandboxing blocks a particular application from the end user’s device. The primary goal is to shield systems resources and other applications from threats such as malware and other malware that might be affecting the sandboxed app.

There are two different methods for applying sandboxing to applications:

Application wraps with security policies – by putting a management layer on the user’s device which applies security controls to the application, and restricts its interaction with other applications.
Separating the application into the virtual or container This provides greater security and better isolation because the program is running in a totally isolated environment from the other components of the endpoint.

All major operating system vendors offer integrated applications sandboxing features. Here’s how application sandboxing operates across three operating systems. Microsoft offers Windows Sandbox, which runs applications inside a virtualized environment and Linux and Apple offer sandboxing solutions using the security policy method.

Microsoft Windows: Windows Sandbox

Windows Sandbox is a sandbox environment that allows you to use Windows applications in a lightweight, isolated desktop environment. It is built upon Windows Containers and Hyper-V technologies. Other software that is installed on the host are not accessible to the sandbox , which means that all software supporting it is required to be installed once again inside the sandbox. Sandboxes are not persistent when closed, it will erase all files and software.

Linux: seccomp-BPF

seccomp-BPF , an open-source Linux Sandbox platform. It functions in a similar way, assigning an appropriate filter the process, which allows or denies system calls to the process. The BPF interpreter checks the system calls based on defined rules and will end the process if the rules are not followed. This provides a degree of isolation for the applications running.

seccomp-BPF isn’t a complete sandbox , but it is a tool to build Linux Sandbox environments.

Apple The Apple Sandbox

It is the Apple Sandbox provides library functions which initialize and configure the Sandbox. It utilizes an extension to the kernel that is built of the TrustedBSD API which enforces sandbox policy.

Apple Sandbox provides the sandbox_init function, which reads policies that are human-readable, then passes these to the kernel and then builds a sandbox based on the policies’ rules. the policies.

Browser Sandboxing

The browser isolation technique is a method of security that physically separates Internet users’ web browsing activity from their computers at home as well as networks and infrastructure. There are two primary methods of browser isolation:

Local browser isolation typically means running the browser inside the form of a virtual machine or container.
Remote browser isolation is achieved by running a browser on an organisation-hosted or cloud-based server. This allows users to browse the internet within a remote virtual world.

Local Browser Isolation Virtual Browser

Virtual browsers operate in a separate environment, they act as a security shield between cyber-based threats and devices used by end-users linked to corporate networks. If a user is on the site of a criminal or downloads a malicious program this threat cannot be detected by the destination.

Virtual browsers can enhance security, as well as allow companies to utilize outdated, unsupported versions of browsers that could be needed for older applications. The main drawback is that they are difficult to connect two browsers that are running simultaneously in terms of browsing history as well as passwords and cookies.

Remote Browser Isolation (RBI)

Remote browser isolation is managed by an organisation, or provided by third-party service providers via the cloud. If users want to surf the Internet using a remote server, it opens a browser within an environment.

There are two methods to stream content from other websites to the user: Pixel pushing which sends a video stream to the device of the user and DOM reconstruction. This blocks out harmful content and recreates the webpage on the device of the user.

As with remote isolation, local isolation is also expensive because it requires the allocation of resources for running large amounts of containerized browsers or paying for the resources that are allocated by an external company. Additionally the pixel pushing process introduces high latency, which results in an unsatisfactory user experience. DOM reconstruction offers better performance however it could cause web pages to crash and not be able eliminate all security risks.

Security Sandbox

Security sandboxing safeguards an business from unknown and known threats like APTs and zero-day attacks. Email is the most frequent attack vector and a sandbox can provide an uninhibited environment to detect malware and malicious code, including trojans, ransomware and worms. A security sandbox is also able to examine files that are streamed or uploaded from apps.

A security sandbox is an environment with security that simulates the computing capabilities of the system. Modern malware is sophisticated and includes sandbox evasion features which is why the latest sandboxes utilize strategies to prevent evasion which “trick” malware into believing it’s operating in a real-world production environment.

The security sandboxing process operates according to the following:

Content is automatically transmitted or uploaded manually to the Sandbox
This file has been “detonated” in an attempt to observe its effects in a controlled atmosphere
In the event that the program is believed as malicious, the file will be removed from the system. If it’s not, it’s permissible for use by organization users.

Sandboxing is the traditional security method. They have many disadvantages, as they are expensive and resource-intensive. Further limitations are described below.

Delayed execution: A sandbox may take between 7 and 20 minutes to review an individual file. In certain instances malware may be programed to run after a time delay or at a particular date.

Hiding dangerous Code inside password-protected attachments The sandbox can’t access the file until it has the password.

Data Obfuscation, Encryption and Data Obfuscation Sandboxes don’t understand how to read encrypted data.

Remotely called VBA or Javascript In this instance, an embedded link in a document can lead to downloading malicious code after the file has passed the sandbox test.

Malware detection of Sandboxes Hackers could make attacks that detect that the file is assessed by a sandbox and, in the event that it is, it remains inert.