Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.

Slides:



Advertisements
Similar presentations
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Advertisements

OPERATING SYSTEM An operating system is a group of computer programs that coordinates all the activities among computer hardware devices. It is the first.
Application Fundamentals Android Development. Announcements Posting in D2L Tutorials.
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
Android architecture overview
Introduction to Android Mohammad A. Gowayyed CS334-Spring 2014.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
1 Mobile Computing Background Copyright 2014 by Janson Industries Can be viewed at:
 Introduction Originally developed by Open Software Foundation (OSF), which is now called The Open Group ( Provides a set of tools and.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
DEPARTMENT OF COMPUTER ENGINEERING
UNIX Chapter 01 Overview of Operating Systems Mr. Mohammad A. Smirat.
Android 101 Application Fundamentals January 29, 2010.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 2: Operating-System Structures Modified from the text book.
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
Label Gallery Developer Series Overview. Label Gallery Developer Series Label Gallery Developer Series is a line of Label Gallery products designed for.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Case study 2 Android – Mobile OS.
Emerging Platform#4: Android Bina Ramamurthy.  Android is an Operating system.  Android is an emerging platform for mobile devices.  Initially developed.
Android Middleware Bo Pang
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Android Introduction Platform Overview.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Copyright© Jeffrey Jongko, Ateneo de Manila University Android.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Android for Java Developers Denver Java Users Group Jan 11, Mike
Presented By: Muhammad Tariq Software Engineer Android Training course.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
ANDROID L. Grewe Components  Java Standard Development Kit (JDK) (download) (latest version)  AndroidStudio.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
PRIOR TO WEB SERVICES THE OTHER TECHNOLOGIES ARE:.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
1 Android Introduction Platform Overview. 2 What is Android?  Android is a software stack for mobile devices that includes an operating system, middleware.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
1 Get All Answers Get All Answers. Contents History of Android Android Fragmentation The Role of Google Features and Architecture Android Software Development.
Android operating system N. Sravani M. Tech(CSE) (09251D5804)
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Accelerometer based motion gestures for mobile devices Presented by – Neel Parikh Advisor Committee members Dr. Chris Pollett Dr. Robert Chun Dr. Mark.
ANDROID OS Ravi Soni MTech (CS) III Sem. W HAT IS A NDROID ? Android is a software stack for mobile devices that includes an operating system, middleware.
The Ingredients of Android Applications. A simple application in a process In a classical programming environment, the OS would load the program code.
Presented by: Saurabh Kumar Sinha (MRT07UGBIT 186) IT VII Semester, Shobhit University Meerut.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Introduction to Android Programming
Android Mobile Application Development
Mobile Applications (Android Programming)
Understanding Android Security
Android System Security
Architecture of Android
SOFTWARE DEVELOPMENT KIT-ios and Blackberry
Android.
CMPE419 Mobile Application Development
Chapter 2: Operating-System Structures
Android Developer Fundamentals V2
Understanding Android Security
Android Platform, Android App Basic Components
Emerging Platform#3 Android & Programming an App
Introduction to Android
CMPE419 Mobile Application Development
Presentation transcript:

Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed

 Android is a software stack for mobile devices that includes an operating system, middleware and key applications. The android provides the tools and APIs necessary to begin developing applications on the Android platform using a programming language.

Android is a widely anticipated open source operating system for mobile devices that provides a base operating system, an application middleware layer, a Java software development kit (SDK), and a collection of system applications. Android has a unique security model, which focuses on putting the user in control of the device

 Android’s growth has been phenomenal: T-Mobile's G1 manufacturer HTC estimates shipment volumes of more than 1 million phones by the end of 2008, and industry insiders expect public adoption to increase steeply.

Traditional desktop and server operating systems have struggled to securely integrate such personal and business applications and services on a single platform. Android doesn’t officially support applications developed for other platforms: applications execute on top of a Java middleware layer running on an embedded Linux kernel.

Android restricts application interaction to its special APIs by running each application as its own user identity. Android uses a simple permission label assignment model to restrict access to resources and other applications.

ANDROID SECURITY MODEL  Android is a Linux platform programmed with Java and enhanced with its own security mechanisms tuned for a mobile environment.  Android combines OS features like efficient shared memory, preemptive multi-tasking, Unix user identifiers (UIDs) and file permissions with the type safe Java language and its familiar class library.

ANDROID SECURITY MODEL  The resulting security model is much more like a multi- user server than the sandbox found on the J2ME or Blackberry platforms.  Unlike in a desktop computer environment where a user’s applications all run as the same UID.

ANDROID SECURITY MODEL  Android applications run in separate processes under distinct UIDs each with distinct permissions. Programs can typically neither read nor-write each other’s data or code, and sharing data between applications must be done explicitly.

ANDROID SECURITY MODEL  applications are given a unique UID, and the application will always run as that UID on that particular device.  The UID of an application is used to protect its data and developers need to be explicit about sharing data with other applications.

ANDROID APPLICATIONS  Android doesn’t have a main() function or single entry point for execution—instead, developers must design applications in terms of components.  The user then uses the Friend Viewer application to retrieve the stored geographic coordinates and view friends on a map.  Android developer chooses from predefined component types depending on the component’s purpose (such as interfacing with a user or storing data).

ANDROID APPLICATIONS

ACTIVITY AND INTERACTION OF COMPONENTS  the interaction between components in the Friend Tracker and Friend Viewer applications and with components in applications defined as part of the base Android distribution.  In each case, one component initiates communication with another. For simplicity, we call this inter-component communication (ICC).

ACTIVITY AND INTERACTION OF COMPONENTS

 for example, when Friend Viewer starts Friend Map, the Friend Map activity appears on the screen. Service components support start, stop, and bind actions, so the Friend Tracker Control activity, for instance, can start and stop the Friend Tracker service that runs in the background.

 The bind action establishes a connection between components, allowing the initiator to execute RPCs defined by the service.  In our example, Friend Tracker binds to the location manager in the system server.  Friend Tracker invokes methods to register a callback that provides updates on the phone’s location

 Figure 3, Android protects applications and data through a combination of two enforcement mechanisms, one at the system level and the other at the ICC level.  ICC mediation defines the core security framework.  it builds on the guarantees provided by the underlying Linux system.

ACCESS PERMISSION LOGIC  The developer assigns permission labels via the XML manifest file that accompanies every application package.  Android’s permission label model only restricts access to components and doesn’t currently provide information flow guarantees, such as in domain type enforcement.

PERMISSION PROTECTION LEVELS  Early versions of the Android SDK let developers mark permission as “application” or “system.  The default application level meant that any application requesting the permission label would receive it.  extended the early model into four protection levels for permission labels, with the meta information specified in the manifest of the package defining the permission

There are only four protection levels for permissions

CONCLUSION  Android applications have their own identity enforced by the system.  Applications can communicate with each other using system provided mechanisms like files, Activities, Services, Broad cast Receivers, and Content Providers.  If you use one of these mechanisms you need to be sure you are talking to the right entity

CONCLUSION  If you are exposing your application for programmatic access by others, make sure you enforce permissions so that unauthorized applications can’t get the user’s private data or abuse your program.  Make your applications security as simple and clear as possible.

Reference  Ahmad Talha Siddiqui, Abu Sarwar Zamani and Jawed Ahmed, Android Security Model that Provide a Base Operating System, JOURNAL OF TELECOMMINUCATION, VOLUME 13, ISSUE 1, MARCH 2012

Thank You