Researchers Find Vulnerabilities in iPhone, iPad Operating System

August 26, 2016

An international team of computer science researchers has identified serious security vulnerabilities in the iOS – the operating system used in Apple’s iPhone and iPad devices. The vulnerabilities make a variety of attacks possible.

“There’s been a lot of research done on Android’s operating systems, so we wanted to take a closer look at Apple’s iOS,” says William Enck, an associate professor of computer science at North Carolina State University and co-author of a paper describing the work. “Our goal was to identify any potential problems before they became real-world problems.”

The researchers focused on the iOS’s “sandbox,” which serves as the interface between applications and the iOS. The iOS sandbox uses a set “profile” for every third-party app. This profile controls the information that the app has access to and governs which actions the app can execute.

To see whether the sandbox profile contained any vulnerabilities that could be exploited by third-party apps, the researchers first extracted the compiled binary code of the sandbox profile. They then decompiled the code, so that it could be read by humans. Next, they used the decompiled code to make a model of the profile, and ran series of automated tests in that model to identify potential vulnerabilities.

Ultimately, the researchers identified vulnerabilities that would allow them to launch different types of attacks via third-party apps. Those attacks include:
• Methods of bypassing the iOS’s privacy settings for contacts;
• Methods of learning a user’s location search history;
• Methods of inferring sensitive information (such as when photos were taken) by accessing metadata of system files;
• Methods of obtaining the user’s name and media library;
• Methods of consuming disk storage space that cannot be recovered by uninstalling the malicious app;
• Methods of preventing access to system resources, such as the address book; and
• Methods that allow apps to share information with each other without permission.

“We are already discussing these vulnerabilities with Apple,” Enck says. “They’re working on fixing the security flaws, and on policing any apps that might try to take advantage of them.”

The paper, “SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles,” will be presented at the ACM Conference on Computer and Communications Security, which is being held Oct. 24-28 in Vienna, Austria. Lead author of the paper is Luke Deshotels, a Ph.D. student at NC State. The paper’s co-authors include Mihai Chiroiu and Răzvan Deaconescu of University Politehnica of Bucharest, and Lucas Davi and Ahmad-Reza Sadeghi of Technische Universität Darmstadt.

The research was done with support from the U.S. Army Research Office, under grant numbers W911NF-16-1-0299 and W011NF-14-1-0537; the National Science Foundation, under grant number CNS-1253345; the Seventh EU Framework Programme award number 609611; and the Deutsche Forschungsgemeinschaft award number CRC1119.

Add Comment




Twitter Feed

Find It Fix It Forum

Sensors invites you to join the Findit-Fixit Forum, where you can get answers to your sensing questions—concerning technologies, products, methods, applications, and services--and also offer help to your fellow engineers. The Forum covers all kinds of topics, from the basics to the extraordinary.

Join the discussion!

© Copyright 2016 Questex, LLC. All Rights Reserved. Sensorsmag. Privacy Policy | Terms of Use

If you are having technical difficulties or considerations, please contact the webmaster.