TU Wien:Foundations of System and Application Security VU (Lindorfer)/Exam 2024-11-28
Zur Navigation springen
Zur Suche springen
- iOS
- iOS is based on Darwin (a Unix-like OS for mobile devices)
- Apps on iOS run via the iOS Runtime (IRT)
- iOS apps need to ask for permission before getting access to the internet
- Apps in iOS are sandboxed
- Android
- Android is based on Darwin
- Apps on Android run via the Android Runtime (ART)
- Android apps need to ask for permission before getting access to the internet
- Apps in Android are sandboxed
- iOS
- iOS apps are uniquely identified by their package name, both on the app store and on the device.
- Since the DMA only browsers using WebKit are allowed on iOS
- It is not possible to embed a website in an iOS app, like on Android where it is possible
- iOS devices don't contain special Hardware to ensure physical integrity like TRNGs
- Android
- If the OS cannot be verified, the system will have a constant red/orange/yellow border around it to notify the user
- Since Android 11 an app gets all the permissions set in its Manifest file
- The OS is only checked when the bootloader is locked
- Unless there is a bug or a backdoor it is not possible to extract fingerprint information from the fingerprint component of a mobile device
- Linux
- -
- The kernel reads the executables header to find out which interpreter/loader to use
- Capabilities are lost when the file is changed
- -
- Coordinated disclosure
- Is when you sell your bug/vulnerability to the highest bidder
- You can keep your identity anonymous by reporting the bug via your national CERT (i.e. CERT.at in Austria)
- The organisation should make sure to fix the bug as soon as possible
- You should be able to find contact information for CVD on the organisations website
- M4: Insufficient Input/Output Validation: Name one vulnerability under this category for mobile devices and what can be done to prevent it.
- M5: Insecure Communication: Name one vulnerability under this category for mobile devices and what can be done to prevent it.
- Describe what a UAF (use after free) vulnerability is and how it can be exploited to achieve arbitrary code execution?
- You have gotten shell access to a linux system. Unfortunately the `ps` command is disabled. Name four types of (meta-)information you can find in the pseudo-file system `/proc`