Presentation-On-Android Os Security Rashu-2

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

ANDROID OS & Security

A brief synopsis of the Android


Operating System and its security.

By
Raisul Islam Rashu
102 0031 042
The ANDROID OS

What is Android?
A mobile operating system initially developed by
Android Inc, a firm acquired by Google in 2005
Based on the Linux kernel
First device working on android OS was HTC G1
which was launched on October 22nd, 2008
The ANDROID OS

History
Google acquires mobile software startup
Android in 2005
Open Handset Alliance (OHA) officially starts
on November 5th, 2007
Android 1.0 source and SDK released in Fall
2008 (http://www.android.com/timeline.html)
The ANDROID OS
The ANDROID OS

Versions

1.0 September 2008

1.1 February 2009

1.5 (Cupcake) April 2009

1.6 (Donut) September 2009

2.0/2.1 (clair) October 2009


The ANDROID OS

Versions

2.2 (Froyo) May 2010

2.3 (Gingerbread) December 2010

3.0/1 (Honeycomb) February/May 2011

3.2.x July/Sept/Aug/Dec 2011, 3.2.6 Feb 2012

4.0.x (Ice Cream Sandwich) Oct, Nov, Dec 2011, March 2012

4.1.1 (Jelly Bean) Unofficially released recently


The ANDROID OS

System Architecture
Linux Version 2.6 or 3.0.1
Dalvik Virtual Machine (VM)
Application Framework
Figure: System-architecture of Android
The ANDROID OS

Applications
Applications are written in Java or Python
Applications are run on the Dalvik Virtual
Machine
Development done in the Android SDK
Development is open to all
User driven Android Market
ANDROID Security

Security - three applicability


Confidentiality
Protect private user data
Integrity
Reliability
Availability
Phone
ANDROID Security

Android Security
Relies on its foundations; Linux, Dalvik, and
Java.
Security Goal: A central design point of the
Android security architecture is that no
application, by default, has permission to
perform any operations that would adversely
impact on other applications, the operating
system, or the user.
ANDROID Security

Enforcement strategy
Application signing and certification.
Linux user name base access restriction
Capability permissions
ANDROID Security

Application Sandboxes
All Applications run as their own Linux user.
Several Inter-Process Communication methods:
Activities
Services
BroadcastReceiver
ContentProvider
Intent
Applications utilize a capability like model to
protect the system and the user.
ANDROID Security

Android Capabilities and Permissions


Capabilities default to safe state
Must be explicitly defined to enable capabilities
Permissions are static on install
Users have open view of permissions
ANDROID Security

Snapshot of GPS Toggle Widget


ANDROID Security

Security Concerns for developers


Protect your application, use least privilege
principle.
If you expose, mediate IPCs
Provide maximum availability
Minimize memory footprint
Minimize battery usage
ANDROID Security

Security Concerns for users

Always try to

Read reviews

Analyze capabilities/permissions before installing


applications
Conclusion

Principles of Secure Design


Least Privilege
Economy of Mechanism
Complete Mediation
Defense in depth
Open Design
Separation of Privilege
Least Common Mechanism
Psychological Acceptability
Secure architecture
Reliance on trust
References
1. Burns, Jesse. Mobile Application Security on Android.
blackhat.com. June 2009. Web. 27 July 2010.
<http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-
AndroidSurgery-PAPER.pdf>

2. Android Developers, Security and Permissions.


developer.android.com. 26 July 2010. Web. 27 July 2010
<http://developer.android.com/guide/topics/security/security.html>

3. Android (operating system) Wiki.


<http://en.wikipedia.org/wiki/Android_%28operating_system%29>

4. Elgin, Ben. Google Buys Android for Its Mobile Arsenal.


businessweek.com. 17 August 2005. Web. 27 July 2010.
<http://www.businessweek.com/technology/content/aug2005/tc20050817_0949_t
c024.htm>
ANDROID OS & Security

THANK YOU

You might also like