Главная
Study mode:
on
1
Intro
2
Flaws
3
iOS Architecture
4
iOS Sandbox
5
Research Question
6
Solution Overview
7
Human readable Graph
8
Sandbox Profile Language
9
Example
10
Questions
11
Writable files
12
Proof of concept
13
How it works
14
Results
15
Disclosure Process
16
Apple Maps
17
iTunes
18
Directory
19
Denial of Service
20
Bypass against Contacts
21
CDE 2015001
22
Conclusion
Description:
Explore a conference talk from CCS 2016 that delves into the automatic detection of flaws in iOS sandbox profiles. Learn about the iOS architecture, sandbox system, and the research question addressed by the SandScout tool. Discover the solution overview, including the human-readable graph and sandbox profile language. Examine examples of writable files and the proof of concept implementation. Understand how SandScout works, its results, and the disclosure process for identified vulnerabilities. Gain insights into specific issues found in Apple Maps, iTunes, and other iOS components, including a directory denial of service and a bypass against Contacts. Conclude with the implications of this research for iOS security.

SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles

Association for Computing Machinery (ACM)
Add to list