In order to limit the damage of malware on Mac OS X and iOS, Apple uses sandboxing, a kernel-level security layer that provides tight constraints for system calls. Particularly used for Apple iOS, sandboxing prevents apps from executing potentially dangerous actions, by defining rules in a sandbox profile. Investigating Apple's built-in sandbox profiles is difficult as they are compiled and stored in binary format. We present SandBlaster, a software bundle that is able to reverse/decompile Apple binary sandbox profiles to their original human readable SBPL (SandBox Profile Language) format. We use SandBlaster to reverse all built-in Apple iOS binary sandbox profiles for iOS 7, 8 and 9. Our tool is, to the best of our knowledge, the first to provide a full reversing of the Apple sandbox, shedding light into the inner workings of Apple sandbox profiles and providing essential support for security researchers and professionals interested in Apple security mechanisms.
翻译:为了限制Mac OS X 和 iOS 上恶意软件的损坏,苹果公司使用沙箱,这是一个内核层面的安全层,为系统呼叫提供严格的限制。 特别是用于苹果iOS,沙箱通过在沙箱配置文件中定义规则,防止应用程序执行潜在危险的行动。 调查苹果公司在沙箱中的内置配置图在以二进制格式汇编和储存时很困难。 我们向SandBlaster展示一个软件包,它能够逆向/解译苹果公司二进制沙箱配置图,使其符合其原始的可读 SBPL(S&Box剖面语言)格式。 我们利用SandBlaster 将iOS iOS 二进式沙箱配置图全部倒置,用于iOS 7、8和9。 我们的工具是,据我们所知,首先提供苹果沙箱全面翻转,将光束进苹果沙箱的内部工作,将光照进苹果公司沙箱配置图,并为对苹果公司安全机制感兴趣的安全研究人员和专业人员提供必要的支持。