By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.

Slides:



Advertisements
Similar presentations
Android architecture overview
Advertisements

Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Available on Laptop ,Desktop, Tablets & Mobiles & Varied Platforms such as Windows, MacOS , iOS , Android, Linux as well as Launching of New services.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
PAYware Mobile Android Comparison June Discussion Topics Obtaining the App PAYware Mobile App.
Android and Project Structure. Android Android OS – Built on Linux Kernel – Phones – Netbooks – Readers – Other???
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
Introduction to Android Platform Overview
Case study 2 Android – Mobile OS.
Android Middleware Bo Pang
Intro to Android Programming George Nychis Srinivasan Seshan.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Byron Alleman Will Galloway Jesse McCall. Permission Based Security Model Users can only use features for which their permissions grant them access Abstracts.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Blio App Tutorial for Android. eBooks Axis 360/Blio.
Computer and Information Sciences
#gsa2012 Android Basics By: Amr Mohsen
Protecting Data on Smartphones and Tablets from Memory Attacks
Android for Java Developers Denver Java Users Group Jan 11, Mike
FMCSA Portal Enforcement: Online Self Service Account Management Prioritization Phase I Release, December 2010 v1.0.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Android Security Auditing Slides and projects at samsclass.info.
Mobile Application Security on Android Originally presented by Jesse Burns at Black Hat
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Wireless and Mobile Security
SCSC 455 Computer Security Chapter 3 User Security.
Mobile Application Development with ANDROID Umang Patel(6537) LDCE.
PAYware Mobile Android Comparison June 2013 For Internal Use Only.
Rooting By Rajan. Topics What is rooting? Different ways to root your phone? Advantages and disadvantages.
VMM Based Rootkit Detection on Android
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
1 Android Workshop Platform Overview. 2 What is Android?  Android is a software stack for mobile devices that includes an operating system, middleware.
Analysis And Research Of System Security Based On.
Android Development For Beginners. What is Android? Android is an open mobile phone platform that was developed by Google and later by Open Handset Alliance.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
Android. I. What’s Android Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. Android is designed.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Android and IOS Permissions Why are they here and what do they want from me?
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Accessing HRMS Off Campus Two-Factor Authentication and Wyosecure.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Android Mobile Application Development
Visit for more Learning Resources
Android Access Control
Android System Security
Architecture of Android
Rooting Android Created By : Mayank Talwar.
chapter 6- Android Introduction
CASE STUDY 1: Linux and Android
What this activity will show you
Security of Mobile Operating Systems
CMPE419 Mobile Application Development
Hide Text Messages on Android Phone
Introduction to Computers
HOW TO SECURE YOUR KINDLE FIRE E-READER? (WATCH LIVE TO FIX)
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
This is a typical Windows user desktop
CS-3013 Operating Systems Hugh C. Lauer
Android Introduction Platform Mihail L. Sichitiu.
Korea Software HRD Center
Android Platform, Android App Basic Components
CMPE419 Mobile Application Development
Android Access Control
Presentation transcript:

By: Collin Molnar

Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access control  Encryption

Intro To Android Source: smartphone-share/

Intro To Android  Open Source  Based of a modified Linux kernel Ice Cream Sandwich is based off of 3.x  Apps are developed in Java Does not use Java Virtual Machine  Libraries and kernel developed in C/C++

Basics of Security  Permissions and application isolation Prevent app from changing system  Storing data Encryption Keeping data safe  Access Control Keep unwanted users from accessing phone

Architecture

Application Isolation  Each app runs on it’s own Apps don’t share resources or memory  Each app runs in a separate process Based of Linux security  Dalvik Virtual Machine does not control security  Foundation of Security for Android

Android Permissions  Default permissions Cannot effect other apps or system Cannot access contacts, SMS,  Each app is contained in a sandbox Apps use intents to talk to other apps Otherwise, apps must request permissions ○ Permissions are only once when app is installed

Problems With Android Permissions  Most users do not understand permissions Just an extra click to users  Apps can pass data

Access Control  Face unlock Could be used by someone who looks similar to you.  Pattern and PIN More secure than face unlock PIN is only numbers  Password Alphanumeric and special characters

Encryption  Added in Android  Uses dm-crypt from the Linux kernel  Requires lock screen PIN or password  Each time phone is powered on the password must be entered  SD card may also be encrypted

Conclusion  Security is based of Linux kernel Each application runs in a sandbox Permissions are used to control apps  Newer devices can be encrypted  Built in physical access control