Works (2)

Updated: July 5th, 2023 15:37

2020 article

Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070.

By: L. Deshotels n, C. Carabas*, J. Beichler n, R. Deaconescu* & W. Enck n

Event: IEEE

author keywords: access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis
TL;DR: Using Kobold, multiple NSXPC services with confused deputy vulnerabilities and daemon crashes are discovered, including the ability to activate the microphone, disable access to all websites, and leak private data stored in iOS File Providers. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: March 8, 2021

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu n, P. Wang n, S. Gorski n, B. Andow n, A. Nadkarni n, L. Deshotels n, J. Gionta n, W. Enck n, X. Gu n

author keywords: Security isolation; access control; resilient architectures
TL;DR: This article provides a hierarchical classification structure for grouping different security isolation techniques by systematically classifying different approaches and analyzing their properties. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.