Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

被引:5
|
作者
Deshotels, Luke [1 ,2 ]
Carabas, Costin [3 ]
Beichler, Jordan [1 ]
Deaconescu, Razvan [3 ]
Enck, William [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Samsung Res Amer, Mountain View, CA 94043 USA
[3] Univ Politehn Bucuresti, Bucharest, Romania
基金
美国国家科学基金会;
关键词
access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis;
D O I
10.1109/SP40000.2020.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apple uses several access control mechanisms to prevent third party applications from directly accessing security sensitive resources, including sandboxing and file access control. However, third party applications may also indirectly access these resources using inter-process communication (IPC) with system daemons. If these daemons fail to properly enforce access control on IPC, confused deputy vulnerabilities may result. Identifying such vulnerabilities begins with an enumeration of all IPC services accessible to third party applications. However, the IPC interfaces and their corresponding access control policies are unknown and must be reverse engineered at a large scale. In this paper, we present the Kobold framework to study NSXPC-based system services using a combination of static and dynamic analysis. Using Kobold, we discovered multiple NSXPC services with confused deputy vulnerabilities and daemon crashes. Our findings include the ability to activate the microphone, disable access to all websites, and leak private data stored in iOS File Providers.
引用
收藏
页码:1056 / 1070
页数:15
相关论文
共 50 条
  • [3] iOracle: Automated Evaluation of Access Control Policies in iOS
    Deshotels, Luke
    Deaconescu, Razvan
    Carabas, Costin
    Manda, Iulia
    Enck, William
    Chiroiu, Mihai
    Li, Ninghui
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 117 - 131
  • [4] A decentralized protocol for mobile control access
    J. A. Alvarez Bermejo
    M. A. Lodroman
    J. A. Lopez-Ramos
    The Journal of Supercomputing, 2014, 70 : 709 - 720
  • [5] A decentralized protocol for mobile control access
    Alvarez Bermejo, J. A.
    Lodroman, M. A.
    Lopez-Ramos, J. A.
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 709 - 720
  • [6] TAKE CONTROL OF REMOTE ACCESS
    MCCUSKER, T
    DATAMATION, 1994, 40 (07): : 62 - 64
  • [7] Decentralized Access Control Encryption in Public Blockchain
    Yao, Zhongyuan
    Pan, Heng
    Si, Xueming
    Zhu, Weihua
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 240 - 257
  • [8] Resilient Desynchronization for Decentralized Medium Access Control
    Silvestre, Daniel
    Hespanha, Joao P.
    Silvestre, Carlos
    IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (03): : 803 - 808
  • [9] Decentralized administration for a temporal access control model
    Bertino, E
    Bettini, C
    Ferrari, E
    Samarati, P
    INFORMATION SYSTEMS, 1997, 22 (04) : 223 - 248
  • [10] Decentralized access control in distributed file systems
    Miltchev, Stefan
    Smith, Jonathan M.
    Prevelakis, Vassilis
    Keromytis, Angelos
    Ioannidis, Sotiris
    ACM COMPUTING SURVEYS, 2008, 40 (03)