Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
| Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor |
| Autore | Hoog Andrew |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Waltham, MA, : Syngress, c2011 |
| Descrizione fisica | 1 online resource (393 p.) |
| Disciplina |
005.4
005.4/46 005.446 363.25 |
| Soggetto topico |
Smartphones - Security measures
Mobile computing - Security measures Data recovery (Computer science) Computer crimes - Investigation |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-28146-5
9786613281463 1-59749-652-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index |
| Record Nr. | UNINA-9910461406503321 |
Hoog Andrew
|
||
| Waltham, MA, : Syngress, c2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
| Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor |
| Autore | Hoog Andrew |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Waltham, MA, : Syngress, c2011 |
| Descrizione fisica | 1 online resource (393 p.) |
| Disciplina |
005.4
005.4/46 005.446 363.25 |
| Soggetto topico |
Smartphones - Security measures
Mobile computing - Security measures Data recovery (Computer science) Computer crimes - Investigation |
| ISBN |
1-283-28146-5
9786613281463 1-59749-652-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index |
| Record Nr. | UNINA-9910789440003321 |
Hoog Andrew
|
||
| Waltham, MA, : Syngress, c2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78216-717-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910453383103321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| ISBN | 1-78216-717-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910790736703321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| ISBN |
9781782167174
178216717X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910957467303321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910459905203321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910787243403321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910815977403321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
| Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] |
| Descrizione fisica | 1 online resource (334 pages) : illustrations |
| Disciplina | 005.4/46 |
| Collana | CRC Series in Security, Privacy and Trust |
| Soggetto topico |
Mobile communication systems - Security measures
Smartphones - Security measures |
| ISBN |
1-315-36964-8
1-4987-3592-4 1-315-35263-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security. |
| Record Nr. | UNINA-9910153184703321 |
| Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
SPSM '15 : proceedings of the 5th annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices : October 12, 2015, Denver, Colorado, USA / / sponsored by ACM SIGSAC
| SPSM '15 : proceedings of the 5th annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices : October 12, 2015, Denver, Colorado, USA / / sponsored by ACM SIGSAC |
| Pubbl/distr/stampa | New York : , : ACM, , 2015 |
| Descrizione fisica | 1 online resource (100 pages) |
| Disciplina | 629.89258 |
| Soggetto topico |
Mobile computing - Security measures
Computer security Smartphones - Security measures |
| ISBN | 1-4503-3819-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Security and Privacy in Smartphones and Mobile Devices '15 : proceedings of the 5th annual Association for Computing Machinery Computer and Communications Security Workshop on Security and Privacy in Smartphones and Mobile Devices : October 12, 2015, Denver, Colorado, United States of America
Security and Privacy in Smartphones and Mobile Devices 2015 Proceedings of the 5th annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices Proceedings of the 5th annual Association for Computing Machinery Computer and Communications Security Workshop on Security and Privacy in Smartphones and Mobile Devices |
| Record Nr. | UNINA-9910376546003321 |
| New York : , : ACM, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||