• Corpus ID: 49213535

Abstractions of Policy Semantics Policy Flaws Static Analysis-iOS Firmware Image-Developer Disk Image Access Control Policy-Unix Permissions-Sandbox Profiles-Capability Requirements Runtime Context-Process Attributes-File Access-Dynamic Observations-Static Program Analysis Decision Engine Questions

@inproceedings{Deshotels2018AbstractionsOP,
  title={Abstractions of Policy Semantics Policy Flaws Static Analysis-iOS Firmware Image-Developer Disk Image Access Control Policy-Unix Permissions-Sandbox Profiles-Capability Requirements Runtime Context-Process Attributes-File Access-Dynamic Observations-Static Program Analysis Decision Engine Questions },
  author={Luke Deshotels},
  year={2018}
}
Modern operating systems, such as iOS, use multiple access control policies to define an overall protection system. However, the complexity of these policies and their interactions can hide policy flaws that compromise the security of the protection system. We propose iOracle, a framework that logically models the iOS protection system such that queries can be made to automatically detect policy flaws. iOracle models policies and runtime context extracted from iOS firmware images, developer… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 28 REFERENCES

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

A first systematic analysis of the iOS container sandbox profile is presented, and the SandScout framework is proposed to extract, decompile, formally model, and analyze iOS sandbox profiles as logic-based programs.

iOS Hacker's Handbook

How the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it are explained.

Fingerprinting Mobile Devices Using Personalized Configurations

Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that all fingerprints are unique and distinguishable and utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time.

Detecting Android Root Exploits by Learning from Root Providers

This paper builds a system RootExplorer, able to detect all malware samples known to perform root exploits and incurs no false positives, and finds an app that is currently available on the markets, that has an embedded root exploit.

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android

SPOKE is proposed, an SEAndroid Policy Knowledge Engine that systematically extracts domain knowledge from rich-semantic functional tests and further uses the knowledge for characterizing the attack surface of SEAndroid policy rules.

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

The research shows that most Android-side harmful behaviors have been preserved on their corresponding iOS libraries, and further identifies new evidence about libraries repackaging for harmful code propagations on both sides.

SandBlaster: Reversing the Apple Sandbox

This tool is, to the best of the knowledge, the first to provide a full reversing of the Apple sandbox, shedding light into the inner workings of Apple sandbox profiles and providing essential support for security researchers and professionals interested in Apple security mechanisms.

XiOS: Extended Application Sandboxing on iOS

A new and generalized attack is shown that significantly reduces the complexity of the recent attacks against iOS sandboxing and the design and implementation of a novel and efficient iOS app hardening service, XiOS, that enables fine-grained application sandboxing, and mitigates the existing as well as the new attacks.

iRiS: Vetting Private API Abuse in iOS Applications

iRiS is effective in detecting private API abuse missed by App Review and shows that, contrary to popular belief, a nontrivial number of iOS applications that violate Apple's terms of service exist in the App Store.

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning

This paper proposes EASEAndroid, the first SEAndroid analytic platform for automatic policy analysis and refinement, and key insight is that the policy refinement process can be modeled and automated using semi-supervised learning.