Conference Paper
A Study of Application Sandbox Policies in Linux
Trevor Dunlap, William Enck, and Bradley Reaves
Proceedings of the ACM Symposium on Access Control Models and Technologies, 2022
Flatpak and Snap sandbox policies improve Linux security, but frequent privilege mismatches between the two platforms for the same application reveal that defining least-privilege policy remains error-prone.
Abstract
Desktop operating systems, including macOS, Windows 10, and Linux, are adopting the application-based security model pervasive in mobile platforms. In Linux, this transition is part of the movement towards two distribution-independent application platforms: Flatpak and Snap. This paper provides the first analysis of sandbox policies defined for Flatpak and Snap applications, covering 283 applications contained in both platforms. First, we find that 90.1% of Snaps and 58.3% of Flatpak applications studied are contained by tamperproof sandboxes. Further, we find evidence that package maintainers actively attempt to define least-privilege application policies. However, defining policy is difficult and error-prone. When studying the set of matching applications that appear in both Flatpak and Snap app stores, we frequently found policy mismatches: e.g., the Flatpak version has a broad privilege (e.g., file access) that the Snap version does not, or vice versa. This work provides confidence that Flatpak and Snap improve Linux platform security while highlighting opportunities for improvement.
Citation (IEEE)
T. Dunlap, W. Enck, and B. Reaves, “A Study of Application Sandbox Policies in Linux,” in Proceedings of the ACM Symposium on Access Control Models and Technologies, 2022.
BibTeX
@inproceedings{der22,
author = {{Trevor Dunlap} and Enck, William and {Bradley Reaves}},
booktitle = {Proceedings of the ACM Symposium on Access Control Models and Technologies},
date = {2022-06},
doi = {10.1145/3532105.3535016},
title = {A Study of Application Sandbox Policies in {Linux}},
}