Back to Search Start Over

SandBlaster: Reversing the Apple Sandbox

Authors :
Deaconescu, R��zvan
Deshotels, Luke
Bucicoiu, Mihai
Enck, William
Davi, Lucas
Sadeghi, Ahmad-Reza
Publication Year :
2016

Abstract

In order to limit the damage of malware on Mac OS X and iOS, Apple uses sandboxing, a kernel-level security layer that provides tight constraints for system calls. Particularly used for Apple iOS, sandboxing prevents apps from executing potentially dangerous actions, by defining rules in a sandbox profile. Investigating Apple's built-in sandbox profiles is difficult as they are compiled and stored in binary format. We present SandBlaster, a software bundle that is able to reverse/decompile Apple binary sandbox profiles to their original human readable SBPL (SandBox Profile Language) format. We use SandBlaster to reverse all built-in Apple iOS binary sandbox profiles for iOS 7, 8 and 9. Our tool is, to the best of our knowledge, the first to provide a full reversing of the Apple sandbox, shedding light into the inner workings of Apple sandbox profiles and providing essential support for security researchers and professionals interested in Apple security mechanisms.<br />25 pages, 9 figures, 14 listings This report is an auxiliary document to the paper "SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles", to be presented at the ACM Conference on Computer and Communications Security (CCS) 2016

Details

Language :
English
Database :
OpenAIRE
Accession number :
edsair.doi.dedup.....cd64be2d39ab85b86c8e1bd613997a8b