13.04.2015 Views

Android OEM's applications (in)security and backdoors ... - QuarksLAB

Android OEM's applications (in)security and backdoors ... - QuarksLAB

Android OEM's applications (in)security and backdoors ... - QuarksLAB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Android</strong> <strong>in</strong>troduction <strong>Android</strong> <strong>security</strong> model Methodology Toward a backdoor without permission Post-exploitation<br />

Plan<br />

1 Context <strong>and</strong> objectives<br />

2 <strong>Android</strong> <strong>in</strong>troduction<br />

3 <strong>Android</strong> <strong>security</strong> model<br />

Applications isolation<br />

The permission system<br />

4 Methodology<br />

5 Toward a backdoor without permission<br />

6 Post-exploitation<br />

7 Scope of the vulnerabilities

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!