Skip to content

backtracer

Updated Jun 19, 2017

No description

Alternative Solutions

Updated May 23, 2017

Several alternative tools have been recommended during this project. We should spend some time investigating them. For example, should we try a different type of Prolog? Should we be using jupyter or maybe a linear logic?

Software Engineering

Updated May 23, 2017

Refine this project so that it is easier to understand, expand, and test.

Writing Paper

Updated May 25, 2017

Tasks related to writing the paper

Test Exploits

Updated Jun 13, 2017

We need to design experiments that provide evidence supporting the feasibility of potential vulnerabilities we find. For example, we might find a file path that seems ideal to use for a name resolution attack, but we need to test whether high integrity processes will follow the link or not.

Model more mechanisms

Updated Jun 19, 2017

There are several access control mechanisms in iOS that we have not modeled yet.

You can’t perform that action at this time.