Lecture 2 PLATFORM SECURITY IN ANDROID OS
|
|
|
- Dwayne Snow
- 10 years ago
- Views:
Transcription
1 Lecture 2 PLATFORM SECURITY IN ANDROID OS
2 You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation Permission-based access control Hardware-based security features 2
3 Mobile Software platform security Mobile Device Third-party library Application Third-party service System service System library User Platform Security Architecture Reference Monitor IPC Software Isolation Developer Platform Provider Administrator System Updater Device Management Boot Verifier Secure Storage Provider Policy Database Application Database Legacy DAC Application Installer Application Loader Execution Protection HW Security API Centralized Marketplace Operator Auxiliary Marketplace Operator Boot Integrity Secure Storage Device Identification Isolated Execution Device Authentication Legend Role Platform Security Component Third-Party Software Component Hardware-Security Functionality 3
4 Mobile software platforms Which mobile platforms have you heard of? 4
5 Smartphone platforms (Image TODO) Android ios Windows Phone Other 81,2% 15,8% 2,2% 0,8% (IDC Dec 2015, market share forecast 2015) 5
6 Android in a nutshell Linux-based (ARM, x86, x86_64, MIPS) Widely used for phones and tablets Wearables, smart TVs, cameras, (handheld) gaming consoles, etc. Open-source software stack + closed source applications and services 6
7 Security goals Android Protect user data Protect system resources Provide application isolation 7
8 On terminology Linux = the kernel Desktop Linux GNU / Linux Linux DAC = (Unix) file permissions Linux MAC = SELinux Permissions = Android app perms. 8
9 Middleware Android Software Stack System Applications Manager IPC Proxies Third-party Applications Content Providers Applications Application Framework System Services & Managers System Server Media Services Media Server Java Core Library Core Libraries Native Daemons Native Libraries ART Android Runtime HAL Modules Hardware Abstraction Layer (HAL) Dalvik Drivers Binder SELinux Power Management Linux Kernel Android Open Source Project. Security
10 Reference monitors Android Software Stack System Applications Manager IPC Proxies Third-party Applications Content Providers Applications Application Framework System Services & Managers System Server Media Services Media Server Java Core Library Core Libraries Native Daemons Native Libraries ART Android Runtime HAL Modules Hardware Abstraction Layer (HAL) Dalvik Drivers Binder SELinux Power Management Linux Kernel Android Open Source Project. Security
11 Android Software Stack System Applications Third-party Applications Android OS Applications Trusted Execution Environment Manager IPC Proxies Content Providers Application Framework System Services & Managers System Server Media Services Media Server Java Core Library Core Libraries Native Daemons Native Libraries Native Code ART Android Runtime HAL Modules Hardware Abstraction Layer (HAL) Dalvik Trusted Applications Trusted OS Services Drivers Binder SELinux Power Management Linux Kernel Trusted OS Kernel Hardware Google. Android for Work Security white paper
12 Application components Manifest Activity Visible UI Intent Service Background job Signature Content Provider Database Broadcast Receiver Enck, Ongtang, McDaniel. Enck, Ongtang, McDaniel: Understanding Android Security Android Open Source Project. Application Security
13 Software distribution Developer Apps from multiple sources Google Play Auxiliary marketplaces Sideloading Pre-installed software Marketplace services Discovery Purchase & Installation User-submitted ratings / flagging Malware scans (Google Bouncer) Remote application installation & removal App Installer Market 13
14 Application signing Goal: same-origin policy for apps MyApp Developer signs with private key Signature verified with developer s public key 14
15 Application signing (cont.) For application packages (APKs) Self-signed X.509 certificates (no PKI!) Individual signature for each file part of APK Package update requires same certificate For over-the-air updates (OTAs) Signature over entire file stored in ZIP comment Verified by OS and Recovery Mode System images must be signed (since 6.0) Elenkov. Android s Security Architecture
16 Com.example.app.apk Android application packages MANIFEST.MF META_INF CERT.RSA AndroidManifest.XML classes.dex lib res assets CERT.SF native code non-compiled resources application assets 16
17 Com.example.app.apk Package Installation META_INF AndroidManifest.XML classes.dex lib res MANIFEST.MF CERT.RSA CERT.SF native code <arch>/libapp.so non-compiled resources Code and resources (common) /data/app/com.example.app/ lib/<arch>/libapp.so oat/<arch>/base.odex base.apk Data (per user) /data/user/0/com.example.app/ files/ databases/ shared_prefs/ /data/user/1/com.example.app/... assets application assets 17
18 Package management components Package Installer (system app) pm command Installer /dev/socket/installd installd daemon PackageManager MountService /dev/socket/vold vold daemon AppDirObserver MediaContainerService /system /data framework/ app/ priv-app/ vendor-app/ Elenkov. Android s Security Architecture packages.xml packages.list app/ data/ media/ user/ 18
19 Application isolation Goal: Applications cannot interfere with one another 19
20 Application isolation Implementation on Android: Kernel: Process & memory protection Kernel: Linux DAC Kernel: Linux MAC (SELinux) Middleware: mediation of Binder IPC Applications run in separate Dalvik / ART virtual machine instances 20
21 Application Sandbox Each application assigned a Unix UID One UID per user per application (since 5.0) UID owns Filesystem resources in /data/user/<nr>/ Processes Permissions (!) Applications from same developer (= signed with same developer key) may share UID sandbox 21
22 Application isolation System Third-party applications Services Applications Linux DAC domain (UID) 22
23 Rooting Rooting applications exploit vulnerabilities in privileged system daemons to obtain shell Note: bootloader unlocking intentionally supported by many OEMs e.g. fastboot oem unlock 23
24 SE for Android Goal: System services and applications should not be able to deviate from their intended modus operandi 24
25 SE for Android (cont.) Implementation on Android: Kernel-level MAC (SELinux) Policies based on SELinux context Middleware MAC (MMAC) Policies based on package identity Smalley, Craig. Smalley, Craig: Security Enhanced (SE) Android Android Open Source Project. Security-Enhanced Linux in Android
26 SE for Android (cont.) Enforces MAC even for processes running with root/superuser privileges (since 4.4) Blocks many root exploits and misconfigurations Cannot protect against kernel exploits Smalley, Craig. Smalley, Craig: Security Enhanced (SE) Android.2013 Android Open Source Project. Security-Enhanced Linux in Android
27 SE for Android Domain - Label for process(es) Type - Label for object(s) Class - Kind of object being accessed (e.g. file, socket) Permission - Operation being performed (e.g. read, write) 27
28 Application isolation (cont) System Third-party applications Services Applications Linux DAC domain (UID) Linux MAC domain (SELinux) 28
29 Protected APIs Goal: Protect system resources from unauthorized access 29
30 Protected APIs System Third-party applications Services Applications Linux DAC domain (UID) Linux MAC domain (SELinux) 30
31 Protected APIs (cont) Implementation in Android: Protected APIs for risky actions Permission-based (mandatory) access control 31
32 Protected APIs(cont) What kinds of system calls on a smartphone would warrant protecting and why? 32
33 Risky Examples of Protected APIs Changing device wallpaper, ringtone Making phone calls, sending SMS s Using camera, microphone, GPS Internet, wireless, Bluetooth access Reading/writing contacts, SMS log Rebooting device Factory reset See also: 33
34 Sensitive user data Subject to permissions checks: Personal information (e.g. contacts) Sensitive input devices (e.g.camera) Location tracking can be manually disabled Device metadata (e.g. logs,) 34
35 Access control & permissions Goal: Controls application access to protected APIs (and each other) User agency vs. protecting system resources Usability of security features 35
36 Android permissions 4 categories Normal Dangerous System Signature or System 36
37 Risky Examples of Protected APIs Changing device wallpaper, ringtone Making phone calls, sending SMS s Using camera, microphone, GPS Internet, wireless, Bluetooth access Reading/writing contacts, SMS log Rebooting device Factory reset Normal Dangerous System See also: 37
38 Permission assignment Application declare all permissions in AndroidManifest.xml Permissions assigned to application UID Some permissions not user-grantable Only available to pre-installed applications INTERNET; READ CONTACTS My Messenger 38
39 Permission assignment Normal permission granted automatically Signature permissions granted if app signature matches the declarer of the signature System permission only assignable by OEM 39
40 User approval (up to 5.1) Dangerous permissions require user approval at install time If not granted, application not installed at all! Granted for all users Stored in /data/system/packages.xml Image: 40
41 User approval (since 6.0) Dangerous permissions require user approval at runtime If not granted, application continues to run with limited capabilities Permission managed per application, per user Stored in /data/system/users/<id>/ runtime-permissions.xml 41
42 Permission revocation May be revoked later from application settings 42
43 Alternatives to obtaining permissions Delegate task to other application using Intent, e.g. invoke Camera app using ACTION_IMAGE_CAPTURE Intent Caller does not need CAMERA permission Caller cannot control the user experience, but does not have to provide UI for task If no default app available, user is prompted to designate the handler Android Open Source Project. Permissions Best Practices. 43
44 Intents Messaging object used for Inter-Component Communication (ICC) Recall: activities, services, content providers, broadcast receivers Addressing Explicit fully qualified component name Implicit Intent filter declared in manifest Provides a mechanism for late binding Pending Intents Token-based access control delegation 44
45 Binder IPC system for object-orientated operating system services (comp. CORBA/COM) Most underlying IPC based on Binder Intents & content providers abstractions on top of Binder Cf. local UNIX-domain sockets, signals, filesystem Bionic libc doesn t support System V IPC Does not provide mediation by itself Access mediated by system services 45
46 binder_become_context_manager() do_add_service() do_find_service() Binder Service Discovery ServiceManager (servicemanager) Services List (*svclist) System Server (system_server) Package Manager Application(s) Application Components e.g. Activity, Service etc. 2 Activity Manager 3 1 Other System Services & Managers 4 Framework library ioctl(binder_set_context_mgr) Binder Driver (/dev/binder) Linux Kernel 46
47 Starting an Activity Application Component e.g. Activity, Service etc. System Server (system_server) Package Manager 1 Activity oncreate( ) 3 Manifest RPC Stub startactivity(intent) Application Framework Binder 4 transact( ) checkcallingpermission( ) Activity Manager ICC Reference Monitor 2 PERMISSION_GRANTED Other System Services & Managers Linux Kernel 47
48 Starting an Activity Application Component e.g. Activity, Service etc. System Server (system_server) Package Manager 1 3 Manifest RPC Stub SecurityException startactivity(intent) Application Framework Binder 4 transact( ) checkcallingpermission( ) Activity Manager ICC Reference Monitor 2 PERMISSION_DENIED Other System Services & Managers Linux Kernel 48
49 Authentication Keyguard Pattern PIN / Password Gatekeeper HAL (since 6.0) Allows Keyguard to make use of native security features TrustAgentAPI (since 5.0) Enables services that notify the system about whether they believe the environment of the device to be trusted Android Open Source Project. Gatekeeper. Elenkov. Password storage in Android M Elenkov. Dissecting Lollipop s SmartLock
50 Authentication (cont.) Smart Lock Trust Agent (since 5.0) Trusted Bluetooth device Trusted NFC Trusted place ( via geofencing ) Facial recognition On-body detection Fingerprint HAL (since 6.0) Access to vendor-specific fingerprint hardware Elenkov. Dissecting Lollipop s SmartLock Nexus Help: Set up your device for automatic unlock. Android Developers. Creating and monitoring Geofences. 50
51 Hardware-based security features Goals: Platform integrity Secure storage 51
52 Hardware-based security features Implementation on Android: Verified boot Full-disk encryption Keychain / Keystore 52
53 Keychain System credential store for private keys and certificate chains (since 4.0) KeyChain API is used for Wi-Fi and Virtual Private Network (VPN) certificates Hardware-backed keystore binds keys to device to make them non-exportable KeyInfo.isInsideSecureHardware() (since 6.0) indicates if key is stored in hardware keystore Google. Android for Work Security white paper
54 Keystore Keystore For application-bound keys Access via Java CE API KeymasterHAL Access to hardware-backed keystore Assymmetric key generation, signing and verification (since 4.1) Binder IKeyStoreInterface (since 4.3) Symmetric key support, access control, public key import and private / symmetric key import (since 6.0) Android Open Source Project. Keymaster. Elenkov. Keystore redesign in Android M Elenkov. Credential storage enhancements in Android
55 Proprietory (device specific) Keystore (cont.) Application Android OS Application Trusted Execution Environment (TEE) Java Cryptography Extensions (JCE) AndroidKeyStore Provider IKeyStoreService KeyStoreService Keymaster HAL libkeymaster.so QSEE Communication API libqseecomapi.so KeyStore Trusted App Qualcomm Secure Execution Environment (QSEE) Hardware ARM TrustZone Elenkov. Keystore redesign in Android M Elenkov. Credential storage enhancements in Android
56 Full Disk Encryption Block-device encryption based on dm-crypt Encrypted on first boot (since 5.0) AES 128 CBC and ESSIV:SHA256 DEK encrypted with AES 128 KEK derived from user PIN / password / pattern + hardware-bound key stored in TEE (since 5.0) Crypto acceleration through hardware AES (e.g. dm-req-crypt) Android Open Source Project. Full Disk Encryption. Elenkov. Hardware-accelerated disk encryption in Android M
57 Verified Boot Based on dm-verity kernel feature Calculates SHA256 hash over every 4K block of the system partition block device Hash values stored in hash tree Tree collapsed into a single root hash Signature of the root hash verified with public key included on the boot partition Must be verified externally by the OEM Android Open Source Project. Verified Boot. 57
58 Verified Boot Hash Tree Android Open Source Project. Verified Boot. 58
59 Mobile Software platform security Mobile Device Third-party library Application Third-party service System service System library User Platform Security Architecture Reference Monitor IPC Software Isolation Developer Platform Provider Administrator System Updater Device Management Boot Verifier Secure Storage Provider Policy Database Application Database Legacy DAC Application Installer Application Loader Execution Protection HW Security API Centralized Marketplace Operator Auxiliary Marketplace Operator Boot Integrity Secure Storage Device Identification Isolated Execution Device Authentication Legend Role Platform Security Component Third-Party Software Component Hardware-Security Functionality 59
60 Did you learn: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation Permission-based access control Hardware-based security features Contributors: Thomas Nyman, Sini Ruohomaa, N. Asokan 60
61 Plan for the course Lecture 1: Platform security basics Lecture 2: Case study Android Lecture 3: Mobile software platform security in general Lecture 4: Hardware security enablers Lecture 5: Usability of platform security Invited lecture: SE Android policies Lecture 6: Summary and outlook 61
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
Android Security. Giovanni Russello [email protected]
Android Security Giovanni Russello [email protected] N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Mobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan Kari Kostiainen 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest in smartphone security 2 NA,
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services
MOBILE SECURITY As seen by FortConsult Lars Syberg Head of Security Services FortConsult A/S Tranevej 16, 2400 Copenhagen, Denmark + 45 70207527 www.fortconsult.net About FortConsult Founded in 2002,
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
company policies are adhered to and all parties (traders,
APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
A Look through the Android Stack
A Look through the Android Stack A Look through the Android Stack Free Electrons Maxime Ripard Free Electrons Embedded Linux Developers c Copyright 2004-2012, Free Electrons. Creative Commons BY-SA 3.0
Overview of CS 282 & Android
Overview of CS 282 & Android Douglas C. Schmidt [email protected] www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282
Android Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
QUIRE: : Lightweight Provenance for Smart Phone Operating Systems
QUIRE: : Lightweight Provenance for Smart Phone Operating Systems Dan S. Wallach Rice University Joint work with Mike Dietz, Yuliy Pisetsky, Shashi Shekhar, and Anhei Shu Android's security is awesome
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
peria TM in Business Mobile Device Management Read about how peria TM devices can be administered in a corporate IT environment Device management clients March 2015 Exchange ActiveSync The my peria service
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps. Hyeokgon Ryu, Infraware Technology, Ltd.
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps Hyeokgon Ryu, Infraware Technology, Ltd. Talking about Needs of Automated Converting from Android To Tizen Introduce
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
Android Security for Enterprise App Developers Jon Preedy
Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
How To Develop Android On Your Computer Or Tablet Or Phone
AN INTRODUCTION TO ANDROID DEVELOPMENT CS231M Alejandro Troccoli Outline Overview of the Android Operating System Development tools Deploying application packages Step-by-step application development The
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development
Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup
Security Enhanced (SE) Android: Bringing Flexible MAC to Android
Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov Abstract The Android software
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Mobile Devices - An Introduction to the Android Operating Environment. Design, Architecture, and Performance Implications
Mobile Devices - An Introduction to the Android Operating Environment Design, Architecture, and Performance Implications Dominique A. Heger DHTechnologies (DHT) [email protected] 1.0 Introduction With
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Overview. The Android operating system is like a cake consisting of various layers.
The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and
Android Architecture For Beginners
Leon Romanovsky [email protected] www.leon.nu April 22, 2013 Introduction Linux-based operating system with market share - 69.70% in smartphones, 42% in tablets, available on smart TVs and mini PC. History
Android Security Joshua Hodosh and Tim Leek
Android Security Joshua Hodosh and Tim Leek This work is sponsored under Air Force contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Firewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
Release Notes. KNOX Premium SDK. Version 2.5
Release Notes Premium SDK 2.5 September 2015 Copyright Notice Copyright 2015 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics Co. Ltd. Samsung
AllJoyn Android Environment Setup Guide
80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Xperia TM Security. Read about how Xperia TM devices manage security in a corporate IT environment
Xperia TM Security in Business Read about how Xperia TM devices manage security in a corporate IT environment System security Secure storage Network security Device security Digital certificates June 2015
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Windows Phone 8 Security deep dive
October 2012 Windows Phone 8 Security deep dive David Hernie Technical Evangelist Microsoft Belux Office Microsoft Corporation All large screen, dual-core, LTE and NFC Nokia Lumia 920 Nokia Lumia 820 Samsung
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Introduction to Android 5 Security
Introduction to Android 5 Security Lukáš Aron and Petr Hanáček Faculty of Information Technology, Department of Intelligent Systems, Brno University of Technology [email protected] Abstract. This paper
Android Fundamentals 1
Android Fundamentals 1 What is Android? Android is a lightweight OS aimed at mobile devices. It is essentially a software stack built on top of the Linux kernel. Libraries have been provided to make tasks
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Security Solution for Android Application Assessment
Security Solution for Android Application Assessment Aparna Bhonde 1, Madhumita Chatterjee 2 Department of IT, PIIT, New Panvel, Mumbai, India 1,2 Abstract: Android Operating System is dominating the share
Using Chroot to Bring Linux Applications to Android
Using Chroot to Bring Linux Applications to Android Mike Anderson Chief Scientist The PTR Group, Inc. [email protected] Copyright 2013, The PTR Group, Inc. Why mix Android and Linux? Android under Linux
Fourteenforty Research Institute, Inc.
Black Hat Abu Dhabi 2011 Yet Another Android Rootkit Fourteenforty Research Institute, Inc. /protecting/system/is/not/enough/ Research Engineer Tsukasa Oi Fourteenforty Research Institute, Inc. http://www.fourteenforty.jp
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
Android Operating System
Prajakta S.Adsule Student-M.B.A.[I.T.] BharatiVidyapeeth Deemed University,Pune(india) [email protected] Mob. No. 9850685985 Android Operating System Abstract- Android operating system is one
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Introduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Android Geek Night. Application framework
Android Geek Night Application framework Agenda 1. Presentation 1. Trifork 2. JAOO 2010 2. Google Android headlines 3. Introduction to an Android application 4. New project using ADT 5. Main building blocks
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
