15.06.2015 Views

Mobile applications security – Android OS (case study) - cygnus

Mobile applications security – Android OS (case study) - cygnus

Mobile applications security – Android OS (case study) - cygnus

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Maciej Olewiński | <strong>Android</strong> <strong>OS</strong> – mobile <strong>applications</strong> <strong>security</strong> model<br />

Permissions – summary<br />

• Easy and extensible mechanism for creating <strong>security</strong> boundary in<br />

distributed environment of application’s components<br />

– <strong>Android</strong> is very <strong>security</strong>-strict in its lower layers<br />

– Even though its higher layers define rich environment of independent, cooperating components<br />

• Fully Optional for exposing data/functionality<br />

• Strictly required for using permissions-protected data/functionality<br />

• Very convenient to use<br />

– Applications developer don’t have to create any additional code<br />

– Declaring permission name and description is sufficient<br />

– <strong>Android</strong> <strong>OS</strong> is responsible for forcing <strong>security</strong> contract keeping<br />

• Perfect solution?<br />

Cryptographic Seminar| 16.05.2012r.<br />

13/18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!