Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Google Open Sources Sandboxed API

Google on Monday announced that it has made available its Sandboxed API as open source in an effort to make it easier for software developers to create secure products.

Google on Monday announced that it has made available its Sandboxed API as open source in an effort to make it easier for software developers to create secure products.

It’s not uncommon for applications to be affected by memory corruption or other types of vulnerabilities that can be exploited for remote code execution and other purposes. Using a sandbox ensures that the code responsible for processing user input can only access the resources it needs to, which mitigates the impact of a flaw by containing the exploit to a restricted environment and preventing it from interacting with other software components.

Sandboxed API open sourceWhile sandboxing can be highly useful, Google says it’s often not easy to implement. That is why the internet giant has decided to open source its Sandboxed API, which should make it easier to sandbox C and C++ libraries. The company has also open sourced its core sandboxing project, Sandbox2, which can be used on its own to secure Linux processes.

“Sandboxed API makes it possible to create security policies for individual software libraries. This concept allows to create reusable and secure implementations of functionality residing within popular software libraries, yet is granular enough to protect the rest of used software infrastructure,” explained members of Google’s ISE Sandboxing team.

For the time being, the Sandboxed API only supports libraries written in C and only Linux. However, Google plans on adding support for more programming runtimes and more operating systems — Unix-like systems may be added sooner, but the company says porting it to Windows is more challenging.

The API’s developers also plan on adding new sandboxing technologies, including hardware virtualization, and extending the build system.

Google has also pointed out that anyone can make suggestions for improving the Sandboxed API, which is also covered by the company’s Patch Reward Program.

The Sandboxed API and Sandbox2 source code is available on GitHub, along with usage instructions.

Related: Chrome OS Network Manager Sandboxed, Stripped of Root Privileges

Advertisement. Scroll to continue reading.

Related: Google Launches “Asylo” Framework for Confidential Computing

Related: Google Introduces Open Source Cross-Platform Crypto Library

Related: Google Open Sources Fuzzing Platform

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.