LEADER 05617nam 2200697 450 001 9910787243403321 005 20230912132719.0 010 $a1-4571-8549-0 010 $a1-59327-641-9 035 $a(CKB)3710000000280873 035 $a(EBL)1842161 035 $a(SSID)ssj0001399128 035 $a(PQKBManifestationID)11801414 035 $a(PQKBTitleCode)TC0001399128 035 $a(PQKBWorkID)11450237 035 $a(PQKB)10955523 035 $a(Au-PeEL)EBL1842161 035 $a(CaPaEBR)ebr10986549 035 $a(OCoLC)896796548 035 $a(Au-PeEL)EBL6049103 035 $a(OCoLC)1156114251 035 $a(CaSebORM)9781457185496 035 $a(MiAaPQ)EBC1842161 035 $a(MiAaPQ)EBC6049103 035 $a(EXLCZ)993710000000280873 100 $a20141201h20152015 uy| 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAndroid security internals $ean in-depth guide to android's security architecture /$fby Nikolay Elenkov ; [foreword by Jon Sawyer] 205 $a1st edition 210 1$aSan Francisco :$cNo Starch Press,$d[2015] 210 4$dİ2015 215 $a1 online resource (434 p.) 300 $aIncludes index. 311 $a1-59327-581-1 320 $aIncludes bibliographical references and index. 327 $aAbout the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary 327 $aChapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management 327 $aAndroid Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User 327 $aUser Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher 327 $aMacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets 327 $aPeer Authentication 330 $aThere are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals-until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device 606 $aOperating systems (Computers)$xSecurity measures 606 $aSmartphones$xSecurity measures 606 $aMobile computing$xSecurity measures 615 0$aOperating systems (Computers)$xSecurity measures. 615 0$aSmartphones$xSecurity measures. 615 0$aMobile computing$xSecurity measures. 676 $a004.1675 700 $aElenkov$b Nikolay$0747673 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787243403321 996 $aAndroid security internals$93684412 997 $aUNINA