Android OEM's applications (in)security and backdoors ... - QuarksLAB
Android OEM's applications (in)security and backdoors ... - QuarksLAB
Android OEM's applications (in)security and backdoors ... - QuarksLAB
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Android</strong> <strong>in</strong>troduction <strong>Android</strong> <strong>security</strong> model Methodology Toward a backdoor without permission Post-exploitation<br />
SD Card: <strong>Android</strong> <strong>and</strong> the retrocompatibility...<br />
SD Card: a protected storage?<br />
Once upon a time... <strong>Android</strong><br />
First versions: total access to the SD Card<br />
read & write access<br />
Current state<br />
Write access: WRITE EXTERNAL STORAGE<br />
Read access: currently ”tolerated” without permission<br />
Dangerous for user privacy (<strong>in</strong>ternet + sdcard)<br />
Introduction of the READ EXTERNAL STORAGE permission<br />
”Protect the SD Card” <strong>in</strong> system parameters (JB)<br />
And what about the retrocompatibility?<br />
From the <strong>and</strong>roid documentation, if m<strong>in</strong>SdkVersion <strong>and</strong><br />
targetSdkVersion