• Complain

Nikolay Elenkov - Android Security Internals: An In-Depth Guide to Androids Security Architecture

Here you can read online Nikolay Elenkov - Android Security Internals: An In-Depth Guide to Androids Security Architecture full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2014, publisher: No Starch Press, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Nikolay Elenkov Android Security Internals: An In-Depth Guide to Androids Security Architecture
  • Book:
    Android Security Internals: An In-Depth Guide to Androids Security Architecture
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2014
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Android Security Internals: An In-Depth Guide to Androids Security Architecture: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Android Security Internals: An In-Depth Guide to Androids Security Architecture" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

I honestly didnt believe Id learn much from the book because Ive been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf.Jon jcase Sawyer, from the Foreword

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionalsuntil now.

In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.

Youll learn:

  • How Android permissions are declared, used, and enforced
  • How Android manages application packages and employs code signing to verify their authenticity
  • How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks
  • About Androids credential storage system and APIs, which let applications store cryptographic keys securely
  • About the online account management framework and how Google accounts integrate with Android
  • About the implementation of verified boot, disk encryption, lockscreen, and other device security features
  • How Androids bootloader and recovery OS are used to perform full system updates, and how to obtain root access
With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.

Nikolay Elenkov: author's other books


Who wrote Android Security Internals: An In-Depth Guide to Androids Security Architecture? Find out the surname, the name of the author of the book and a list of all author's works by series.

Android Security Internals: An In-Depth Guide to Androids Security Architecture — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Android Security Internals: An In-Depth Guide to Androids Security Architecture" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Android Security Internals: An In-Depth Guide to Androids Security Architecture
Nikolay Elenkov
Published by No Starch Press
About the Author

Nikolay Elenkov has been working on enterprise security projects for the past 10 years. He has developed security software on various platforms, ranging from smart cards and HSMs to Windows and Linux servers. He became interested in Android shortly after the initial public release and has been developing applications for it since version 1.5. Nikolays interest in Android internals intensified after the release of Android 4.0 (Ice Cream Sandwich), and for the past three years hes been documenting his findings and writing about Android security on his blog, http://nelenkov.blogspot.com/ .

About the Technical Reviewer

Kenny Root has been a core contributor to the Android platform at Google since 2009, where his focus has been primarily on security and cryptography. He is the author of ConnectBot, the first SSH app for Android, and is an avid open source contributor. When hes not hacking on software, hes spending time with his wife and two boys. He is an alumnus of Stanford University, Columbia University, Chinese University of Hong Kong, and Baker College, but hes originally from Kansas City, which has the best barbecue.

Foreword

I first became aware of the quality of Nikolays work in Android security with the release of Android 4.0, Ice Cream Sandwich. I needed a better explanation of the new Android backup format; I was struggling to exploit a vulnerability I had found, because I didnt have a full grasp of the new feature and format. His clear, in-depth explanation helped me understand the issue, exploit the vulnerability, and get a patch into production devices quickly. I have since been a frequent visitor to his blog, often referring to it when I need a refresher.

While I was honored to be asked to write this foreword, I honestly didnt believe Id learn much from the book because Ive been working on Android security for many years. This belief could not have been more wrong. As I read and digested new information regarding subjects I thought I knew thoroughly, my mind whirled with thoughts of what I had missed and what I could have done better. Why wasnt a reference like this available when I first engrossed myself in Android?

This book exposes the reader to a wide range of security topics, from Android permissions and sandboxing to the Android SELinux implementation, SEAndroid. It provides excellent explanations of minute details and rarely seen features such as dm-verify. Like me, youll walk away from this book with a better understanding of Android security features.

Android Security Internals has earned a permanent spot on my office bookshelf.

Jon jcase Sawyer
CTO, Applied Cybersecurity LLC
Port Angeles, WA

Acknowledgments

I would like to thank everyone at No Starch Press who worked on this book. Special thanks to Bill Pollock for making my ramblings readable and to Alison Law for her patience in turning them into an actual book.

A big thanks to Kenny Root for reviewing all chapters and sharing the backstories behind some of Androids security features.

Thanks to Jorrit Chainfire Jongma for maintaining SuperSU, which has been an invaluable tool for poking at Androids internals, and for reviewing my coverage of it in .

Thanks to Jon jcase Sawyer for continuing to challenge our assumptions about Android security and for contributing a foreword to my book.

Introduction

In a relatively short period of time, Android has become the worlds most popular mobile platform. Although originally designed for smartphones, it now powers tablets, TVs, and wearable devices, and will soon even be found in cars. Android is being developed at a breathtaking pace, with an average of two major releases per year. Each new release brings a better UI, performance improvements, and a host of new user-facing features which are typically blogged about and dissected in excruciating detail by Android enthusiasts.

One aspect of the Android platform that has seen major improvements over the last few years, but which has received little public attention, is security. Over the years, Android has become more resistant to common exploit techniques (such as buffer overflows), its application isolation (sandboxing) has been reinforced, and its attack surface has been considerably reduced by aggressively decreasing the number of system processes that run as root. In addition to these exploit mitigations, recent versions of Android have introduced major new security features such as restricted user support, full-disk encryption, hardware-backed credential storage, and support for centralized device management and provisioning. Even more enterprise-oriented features and security improvements such as managed profile support, improved full-disk encryption, and support for biometric authentication have been announced for the next Android release (referred to as Android L as I write this).

As with any new platform feature, discussing cutting-edge security improvements is exciting, but its arguably more important to understand Androids security architecture from the bottom up because each new security feature builds upon and integrates with the platforms core security model. Androids sandboxing model (in which each application runs as a separate Linux user and has a dedicated data directory) and permission system (which requires each application to explicitly declare the platform features it requires) are fairly well understood and documented. However, the internals of other fundamental platform features that have an impact on device security, such as package management and code signing, are largely treated as a black box beyond the security research community.

One of the reasons for Androids popularity is the relative ease with which a device can be flashed with a custom build of Android, rooted by applying a third-party update package, or otherwise customized. Android enthusiast forums and blogs feature many practical How to guides that take users through the steps necessary to unlock a device and apply various customization packages, but they offer very little structured information about how such system updates operate under the hood and what risks they carry.

This books aims to fill these gaps by providing an exploration of how Android works by describing its security architecture from the bottom up and delving deep into the implementation of major Android subsystems and components that relate to device and data security. The coverage includes broad topics that affect all applications, such as package and user management, permissions and device policy, as well as more specific ones such as cryptographic providers, credential storage, and support for secure elements.

Its not uncommon for entire Android subsystems to be replaced or rewritten between releases, but security-related development is conservative by nature, and while the described behavior might be changed or augmented across releases, Androids core security architecture should remain fairly stable in future releases.

Who This Book Is For

This book should be useful to anyone interested in learning more about Androids security architecture. Both security researchers looking to evaluate the security level of Android as a whole or of a specific subsystem and platform developers working on customizing and extending Android will find the high-level description of each security feature and the provided implementation details to be a useful starting point for understanding the underlying platform source code. Application developers can gain a deeper understanding of how the platform works, which will enable them to write more secure applications and take better advantage of the security-related APIs that the platform provides. While some parts of the book are accessible to a non-technical audience, the bulk of the discussion is closely tied to Android source code or system files, so familiarity with the core concepts of software development in a Unix environment is useful.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Android Security Internals: An In-Depth Guide to Androids Security Architecture»

Look at similar books to Android Security Internals: An In-Depth Guide to Androids Security Architecture. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Android Security Internals: An In-Depth Guide to Androids Security Architecture»

Discussion, reviews of the book Android Security Internals: An In-Depth Guide to Androids Security Architecture and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.