SandBlaster: Reversing the Apple Sandbox

08/15/2016
by   Răzvan Deaconescu, et al.
0

In order to limit the damage of malware on Mac OS X and iOS, Apple uses sandboxing, a kernel-level security layer that provides tight constraints for system calls. Particularly used for Apple iOS, sandboxing prevents apps from executing potentially dangerous actions, by defining rules in a sandbox profile. Investigating Apple's built-in sandbox profiles is difficult as they are compiled and stored in binary format. We present SandBlaster, a software bundle that is able to reverse/decompile Apple binary sandbox profiles to their original human readable SBPL (SandBox Profile Language) format. We use SandBlaster to reverse all built-in Apple iOS binary sandbox profiles for iOS 7, 8 and 9. Our tool is, to the best of our knowledge, the first to provide a full reversing of the Apple sandbox, shedding light into the inner workings of Apple sandbox profiles and providing essential support for security researchers and professionals interested in Apple security mechanisms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/28/2022

Shedding Light on the Targeted Victim Profiles of Malicious Downloaders

Malware affects millions of users worldwide, impacting the daily lives o...
research
02/02/2010

Detecting Motifs in System Call Sequences

The search for patterns or motifs in data represents an area of key inte...
research
03/22/2018

Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law

Massive content about user's social, personal and professional life stor...
research
08/24/2019

That's Not Me! Designing Fictitious Profiles to Answer Security Questions

Although security questions are still widely adopted, they still have se...
research
06/02/2020

Identifying Fake Profiles in LinkedIn

As organizations increasingly rely on professionally oriented networks s...
research
10/27/2022

Convolutional Codes with Optimum Bidirectional Distance Profile

In this paper we present tables of convolutional codes with an optimum b...
research
10/01/2021

Learner to learner fuzzy profiles similarity using a hybrid interaction analysis grid

The analysis of remote discussions is not yet at the same level as the f...

Please sign up or login with your details

Forgot password? Click here to reset