Destroying sandboxes

Discussion in 'other security issues & news' started by bigc73542, Jul 18, 2007.

Thread Status:
Not open for further replies.
  1. bigc73542

    bigc73542 Retired Moderator

    Joined:
    Sep 21, 2003
    Posts:
    23,934
    Location:
    SW. Oklahoma
    One of the mechanisms used by anti-malware applications is to institute a virtual "sandbox" to isolate suspicious files from the rest of the system while they are quickly analysed for malicious content or behaviour.

    Creating a sandbox requires the anti-malware software to essentially institute a Virtual Machine - a computer that is completely implemented in software. A lot of current sandboxes are designed to emulate network connections and normal system behaviour in an effort to trap malicious output from a suspicious file or application

    Full story here http://www.theregister.co.uk/2007/07/16/sandbox_malware/
     
  2. WSFuser

    WSFuser Registered Member

    Joined:
    Oct 7, 2004
    Posts:
    10,639
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.