markov-ir-kulipanov-va-orlov-av-tik-65-2024-3.pdf |
- 10
- COMPETITIVE PROGRAMMING PLATFORM AND METHODS OF SAFELY EXECUTING UNTRUSTED CODE
- Markov I. R., Kulipanov V. A., Orlov A. V. Competitive programming platform and methods of safely executing untrusted code. Technologies & Quality. 2024. No 3(65). P. 67–71. (In Russ.). https://doi.org/10.34216/2587-6147-2024-3-65-67-71.
- DOI: https://doi.org/10.34216/2587-6147-2024-3-65-67-71
- УДК: 004.4'6
- EDN: YYPHHD
- Publish date: 2024-09-23
- Annotation: The article discusses the use of information systems for holding programming Olympiads, especially in the context of executing code from untrusted sources. An analysis of existing systems designed to ensure the safe execution of tasks by Olympiad participants is conducted, and the problems faced by organisers and developers of such systems are discussed. Their shortcomings are shown, such as complexity of use, limited functionality, commercial focus. A system is proposed that can function in the internal local network of an institution, providing the ability to hold both online and offline Olympiads. The article also pays attention to security measures that can be taken to minimise risks when executing code from untrusted sources. The authors focus on the analysis of existing isolation and virtualisation methods, identifying their advantages and disadvantages.
- Keywords: modern education, programming, Olympiads, information system, checking results, process access rights, file system, virtualisation
- Literature list: 1. Nobody (user): Wikipedia. URL: https://ru.wikipedia.org/wiki/Nobody_ (accessed 25.05.2024). 2. Antonov K. How do I use the Chroot utility on Linux? Server Space. URL: https://serverspace.by/support/help/kak-ispolzovat-utilitu-chroot-v-linux/?utm_source=google.com& utm_ medium= organic&utm_campaign=google.com&utm_referrer=google.com. (accessed 25.05.2024). 3. Ubah I. P. Deep dive into Linux namespaces. P. 3. The Habr. URL: https://habr.com/ru/articles/541304 (accessed 25.05.2024). 4. Introduction to Iptables. The Habr. URL: https://habr.com/ru/articles/747616 (accessed 25.05.2024). 5. Understanding Docker. The Habr. URL: https://habr.com/ru/articles/253877 (accessed 25.05.2024). 6. For the Linux kernel, an implementation of the white list of executable applications is proposed. Open-Net. URL: https://opennet.ru/46626-whiteegret (accessed 25.05.2024). 7. Secure Linux with AppArmor. The Habr. URL: https://habr.com/ru/companies/ruvds/articles/532988 (accessed 25.05.2024).