Does sandbox security really protect your desktop?

Tests question vendor claims of meaningfully improved security, though not everyone agrees

Two years ago, GreenBorder, one of the early "sandbox" browsers, received mighty applause from Wall Street Journal tech guru Walt Mossberg. The sandbox browser -- basically, a browser running in a virtual container -- promised to keep nasty code from spilling into a computer's operating system and wreaking havoc.

Tests showed a year earlier that such sandbox technology didn't really work, at least not then. This year, to see if anything had changed, a new version of this technology was tested, in the form of Check Point's ZoneAlarm ForceField. Same result: it didn't do the job. "Within less than a minute, by clicking only my third test malicious Web site link, my test system was silently compromised without so much as a chirp out of ForceField," wrote security guru Roger Grimes.

The problem, then and now, is the sandbox wall remained permeable, so Trojans and other forms of malware can slip through the virtual sandbox into your desktop.

Grimes believes the technology approach of the sandbox browser, which he calls virtual red-green computing because the browser is the unsafe red zone and the operating system is the safe green zone, is fundamentally flawed -- and so he debunks the entire product category. Virtual red-green computing is the decades-old practice of creating separate safe and unsafe zones on a computer using virtualization techniques.

Sandbox browsers are largely aimed at consumers and small businesses. Products include ForceField (which claims to protect more than 60 million PCs), Sandboxie, Trusteer, and Safecentral.com. (Google bought GreenBorder a year ago, and it seems to have since disappeared as a product.)

Grimes' gripe: blurring red and green lines

The problem with sandbox browsers, Grimes says, is that eventually a browser and the operating system have to talk because they are so heavily integrated in the desktop environment -- that is, the red and green areas of a computer must co-mingle. It's nearly impossible to isolate one from the other, given browser plug-ins, JavaScript, and ActiveX controls that need to run code on the operating system.

In Grimes' ForceField test, for example, he visited known malicious Web sites with an unpatched Windows XP computer running ForceField and, again, with a fully patched computer sans ForceField. He did this to single out ForceField's capabilities. The fully patched computer foiled all attacks, whereas the non-patched computer with ForceField was breached on the third Web site Grimes visited.

The breach occurred when Grimes clicked on a malformed Flash file that caused a buffer overflow, sending an executable string of code into the computer's memory. "The malformed file used an API that was unexpected by ForceField to install itself as a service," he says. "Most of these limited emulation products cover dozens of the most popular APIs, but malware uses hundreds. Unless you cover every API call, [malware] is going to get around it."

In other words, "if the browser needs to launch an application, then all bets on the sandbox are off," says Doug Dineley, executive editor of the Test Center. "The application has to interact with the OS."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tom Kaneshige

InfoWorld
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?