Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

被引:5
|
作者
Deshotels, Luke [1 ,2 ]
Carabas, Costin [3 ]
Beichler, Jordan [1 ]
Deaconescu, Razvan [3 ]
Enck, William [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Samsung Res Amer, Mountain View, CA 94043 USA
[3] Univ Politehn Bucuresti, Bucharest, Romania
基金
美国国家科学基金会;
关键词
access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis;
D O I
10.1109/SP40000.2020.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apple uses several access control mechanisms to prevent third party applications from directly accessing security sensitive resources, including sandboxing and file access control. However, third party applications may also indirectly access these resources using inter-process communication (IPC) with system daemons. If these daemons fail to properly enforce access control on IPC, confused deputy vulnerabilities may result. Identifying such vulnerabilities begins with an enumeration of all IPC services accessible to third party applications. However, the IPC interfaces and their corresponding access control policies are unknown and must be reverse engineered at a large scale. In this paper, we present the Kobold framework to study NSXPC-based system services using a combination of static and dynamic analysis. Using Kobold, we discovered multiple NSXPC services with confused deputy vulnerabilities and daemon crashes. Our findings include the ability to activate the microphone, disable access to all websites, and leak private data stored in iOS File Providers.
引用
收藏
页码:1056 / 1070
页数:15
相关论文
共 50 条
  • [21] Remote decentralized control strategy for cooperative mobile robots
    Fraisse, P
    Andreu, D
    Zapata, R
    Richard, JP
    Divoux, T
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1011 - 1016
  • [22] Access Control for Shared Remote Laboratories
    Mateos, Veronica
    Bellidoa, Luis
    Villagra, Victor A.
    Richter, Thomas
    Gallardo, Alberto
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2012, 44 (02): : 111 - 128
  • [23] Distributed access control for remote user
    Xie, Fangjun
    Tang, Changjie
    Chen, Anlong
    Zhang, Hong
    Yuan, Changan
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (02): : 37 - 39
  • [24] Enhanced Authentication for Decentralized IoT Access Control Architecture
    Kang, Jeong Hwa
    Seo, Minhye
    CRYPTOGRAPHY, 2023, 7 (03)
  • [25] Decentralized Access Control for Secure Microservices Cooperation with Blockchain
    Xi, Ning
    Li, Yajie
    Liu, Jin
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 598 - 614
  • [26] Decentralized data access control over consortium blockchains
    Chen, Yaoliang
    Chen, Shi
    Liang, Jiao
    Feagan, Lance Warren
    Han, Weili
    Huang, Sheng
    Wang, X. Sean
    INFORMATION SYSTEMS, 2020, 94
  • [27] Fast Desynchronization for Decentralized Multichannel Medium Access Control
    Deligiannis, Nikos
    Mota, Joao F. C.
    Smart, George
    Andreopoulos, Yiannis
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (09) : 3336 - 3349
  • [28] Decentralized access control for secure microservices cooperation with blockchain
    Xi, Ning
    Liu, Jin
    Li, Yajie
    Qin, Bojun
    ISA TRANSACTIONS, 2023, 141 : 44 - 51
  • [29] Blockchain-Based, Decentralized Access Control for IPFS
    Steichen, Mathis
    Fiz, Beltran
    Norvill, Robert
    Shbair, Wazen
    State, Radu
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1499 - 1506
  • [30] Passive, Decentralized, and fully Autonomous Intersection Access Control
    Khoury, John
    Khoury, Joud
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2014, : 3028 - 3033