Android Security Internals

时间:2022-02-14 03:40:38
【文件属性】:
文件名称:Android Security Internals
文件大小:8.13MB
文件格式:PDF
更新时间:2022-02-14 03:40:38
Android Secu Security 安全架构深究 Android In a relatively short period of time, Android has become the world’s most popular mobile platform. Although originally designed for smartphones, it now powers tablets, TVs, and wearable devices, and will soon even be found in cars. Android is being developed at a breathtaking pace, with an average of two major releases per year. Each new release brings a better UI, performance improvements, and a host of new user-facing features which are typically blogged about and dissected in excruciating detail by Android enthusiasts. One aspect of the Android platform that has seen major improvements over the last few years, but which has received little public attention, is security. Over the years, Android has become more resistant to common exploit techniques (such as buffer overflows), its application isolation (sandboxing) has been reinforced, and its attack surface has been considerably reduced by aggressively decreasing the number of system processes that run as root. In addition to these exploit mitigations, recent versions of Android have introduced major new security features such as restricted user support, www.it-ebooks.info xxii Introduction full-disk encryption, hardware-backed credential storage, and support for centralized device management and provisioning. Even more enterpriseoriented features and security improvements such as managed profile support, improved full-disk encryption, and support for biometric authentication have been announced for the next Android release (referred to as Android L as I write this).

网友评论