Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

被引:5
|
作者
Deshotels, Luke [1 ,2 ]
Carabas, Costin [3 ]
Beichler, Jordan [1 ]
Deaconescu, Razvan [3 ]
Enck, William [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Samsung Res Amer, Mountain View, CA 94043 USA
[3] Univ Politehn Bucuresti, Bucharest, Romania
基金
美国国家科学基金会;
关键词
access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis;
D O I
10.1109/SP40000.2020.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apple uses several access control mechanisms to prevent third party applications from directly accessing security sensitive resources, including sandboxing and file access control. However, third party applications may also indirectly access these resources using inter-process communication (IPC) with system daemons. If these daemons fail to properly enforce access control on IPC, confused deputy vulnerabilities may result. Identifying such vulnerabilities begins with an enumeration of all IPC services accessible to third party applications. However, the IPC interfaces and their corresponding access control policies are unknown and must be reverse engineered at a large scale. In this paper, we present the Kobold framework to study NSXPC-based system services using a combination of static and dynamic analysis. Using Kobold, we discovered multiple NSXPC services with confused deputy vulnerabilities and daemon crashes. Our findings include the ability to activate the microphone, disable access to all websites, and leak private data stored in iOS File Providers.
引用
收藏
页码:1056 / 1070
页数:15
相关论文
共 50 条
  • [41] MULTIMODAL ACCESS CONTROL SYSTEMS WHICH COMBINES CLASSICAL ACCESS CONTROL METHODS WITH BIOMETRIC METHODS
    Daniel, David Marius
    Monica, Borda
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 261 - 264
  • [42] Decentralized Event-triggered Medium Access Control for Networked Control Systems
    Mamduhi, Mohammad H.
    Kneissl, Maximilian
    Hirche, Sandra
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 513 - 519
  • [43] OPTIMAL DECENTRALIZED CONTROL IN THE RANDOM-ACCESS MULTIPACKET CHANNEL
    GHEZ, S
    VERDU, S
    SCHWARTZ, SC
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1989, 34 (11) : 1153 - 1163
  • [44] Delegation Management in Service Oriented Decentralized Access Control Model
    Wang, Houxiang
    Han, Ruofei
    Jing, Xiaopei
    Yang, Hong
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 316 - 320
  • [45] Decentralized Power Control for Random Access with Successive Interference Cancellation
    Xu, Chongbin
    Ping, Li
    Wang, Peng
    Chan, Sammy
    Lin, Xiaokang
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (11) : 2387 - 2396
  • [46] Secure decision tree classification with decentralized authorization and access control
    Wang, Chen
    Xu, Jian
    Tan, Shanru
    Yin, Long
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [47] DPE/PAC: decentralized process engine with product access control
    Chou, SC
    Hsu, WC
    Lo, WK
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) : 207 - 219
  • [48] Flexible authorization with decentralized access control model for grid computing
    Zhang, Xinwen
    Li, Qi
    Seifert, Jean-Pierre
    Xu, Mingwei
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 156 - +
  • [49] Revocable, dynamic and decentralized data access control in cloud storage
    Wang, Chong
    Jin, Hao
    Wei, Ronglei
    Zhou, Ke
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 10063 - 10087
  • [50] Revocable, dynamic and decentralized data access control in cloud storage
    Chong Wang
    Hao Jin
    Ronglei Wei
    Ke Zhou
    The Journal of Supercomputing, 2022, 78 : 10063 - 10087