Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

被引:5
|
作者
Deshotels, Luke [1 ,2 ]
Carabas, Costin [3 ]
Beichler, Jordan [1 ]
Deaconescu, Razvan [3 ]
Enck, William [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Samsung Res Amer, Mountain View, CA 94043 USA
[3] Univ Politehn Bucuresti, Bucharest, Romania
基金
美国国家科学基金会;
关键词
access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis;
D O I
10.1109/SP40000.2020.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apple uses several access control mechanisms to prevent third party applications from directly accessing security sensitive resources, including sandboxing and file access control. However, third party applications may also indirectly access these resources using inter-process communication (IPC) with system daemons. If these daemons fail to properly enforce access control on IPC, confused deputy vulnerabilities may result. Identifying such vulnerabilities begins with an enumeration of all IPC services accessible to third party applications. However, the IPC interfaces and their corresponding access control policies are unknown and must be reverse engineered at a large scale. In this paper, we present the Kobold framework to study NSXPC-based system services using a combination of static and dynamic analysis. Using Kobold, we discovered multiple NSXPC services with confused deputy vulnerabilities and daemon crashes. Our findings include the ability to activate the microphone, disable access to all websites, and leak private data stored in iOS File Providers.
引用
收藏
页码:1056 / 1070
页数:15
相关论文
共 50 条
  • [31] Trust Management in Decentralized IoT Access Control System
    Putra, Guntur Dharma
    Dedeoglu, Volkan
    Kanhere, Saul S.
    Jurdak, Raja
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), 2020,
  • [32] A Decentralized Solution for Combinatorial Testing of Access Control Engine
    Daoudagh, Said
    Lonetti, Francesca
    Marchetti, Eda
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 126 - 135
  • [33] Cacheable decentralized groups for grid resource access control
    Hemmes, Jeffrey
    Thain, Douglas
    2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 192 - +
  • [34] Decentralized access control with policy updating in cloud manufacturing
    Li L.
    Gu T.
    Chang L.
    Li J.
    Qian J.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2280 - 2290
  • [35] Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
    Bodriagov, Oleksandr
    Kreitz, Gunnar
    Buchegger, Sonja
    2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 622 - 628
  • [36] STATE SPACE METHODS FOR DECENTRALIZED H∞ CONTROL
    Wu Min
    Gut Weihua
    Chen Ning(Department of Automatic Control Engineering
    Journal of Central South University of Technology(English Edition), 1994, (01) : 91 - 96
  • [37] THEORY AND APPLICATIONS SURVEY OF DECENTRALIZED CONTROL METHODS
    ATHANS, M
    ANNALS OF ECONOMIC AND SOCIAL MEASUREMENT, 1975, 4 (02): : 345 - 355
  • [38] Dynamic traffic control: Decentralized and coordinated methods
    Porche, I
    Lafortune, S
    IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, 1997, : 930 - 935
  • [39] Decentralized Control Methods in Hypergraph Distributed Optimization
    Papastaikoudis, Ioannis
    Lestas, Ioannis
    COMPLEX NETWORKS & THEIR APPLICATIONS XII, VOL 3, COMPLEX NETWORKS 2023, 2024, 1143 : 159 - 170
  • [40] GEADAT 80, A Remote Control System with Decentralized Intelligence.
    Kahl, Ludwig
    Technische Mitteilungen AEG-Telefunken, 1980, 70 (2-3): : 89 - 94