backtracer
No description
Alternative Solutions
Several alternative tools have been recommended during this project. We should spend some time investigating them. For example, should we try a different type of Prolog? Should we be using jupyter or maybe a linear logic?
Software Engineering
Refine this project so that it is easier to understand, expand, and test.
Writing Paper
Tasks related to writing the paper
Test Exploits
We need to design experiments that provide evidence supporting the feasibility of potential vulnerabilities we find. For example, we might find a file path that seems ideal to use for a name resolution attack, but we need to test whether high integrity processes will follow the link or not.
Model more mechanisms
There are several access control mechanisms in iOS that we have not modeled yet.