Android UI operations are not thread-safe, and only the main thread can operate the UI. At the same time, the main thread has a certain time limit on UI operations (up to 5 seconds ). To perform some time-consuming operations (such as downloading and opening large files), Android provides some column mechanisms. The articles in the "android basics 02-thread
utilities (such as process-level security, application-related user and group IDs, and permissions) to implement the operations that the application is allowed to perform.Figure 1. Two Android apps, each on their own basic sandbox or processAndroid applications run on their own Linux processes and are assigned a unique user ID. By default, applications running i
one of Android four components--activity security details.
Original address: http://drops.wooyun.org/tips/3936 0x00 Popular Science
Each Android application is made up of basic Android components such as activity, Service, content provider, and broadcast receiver, The activity is the main body that implemen
Release date: 2011-08-02Updated on: 2011-08-02
Affected Systems:Android Open Handset Alliance Android 3.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2357
Android is a project launched by Google through Open Handset Alliance. It is used to provide a complete set of software for mobile devices, including operating systems and middleware.
Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3500)
Release date:Updated on:
Affected Systems:Apache Group Cordova Description:--------------------------------------------------------------------------------Bugtraq id: 69038CVE (CAN) ID: CVE-2014-3500Apache Cordova is a platform for building local mobile applications using HTML, CSS, and JavaScript.Android applications built
Multiple security vulnerabilities in Google Chrome for Android 40.0.2214.109 and earlier versions
Release date:Updated on:
Affected Systems:Google Chrome Description:Bugtraq id: 72497CVE (CAN) ID: CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212
Google Chrome is a Web browser tool developed by Google.
Chrome for Android 40.0.2214.109 and earlier version
The HotPatch hot fix on Android was invented by Ali, the domestic is very innovative in this area, I mainly focus on the security of HotPatch. This is a comprehensive introduction to the domestic application of the hot repair technology article but did not mention the potential security issues: Http://www.infoq.com/cn/articles/
after its own package name.Non-system-level apps only agree to operate under the android/data/The above describes the limitations of access restrictions. Files written to external storage may be at risk of being changed and read by different apps on the same device (Android4.4 version number).Android API Guide [Android
market turmoil in Android apps, the level of developers is uneven. So now the vulnerabilities of Android applications, malware, fishing and so on are still increasing. plus root for App sandbox damage, Android upgrade restrictions. The domestic Android environment is chaot
. Currently KSOAP does not support WS-SECURITYTCP layer SSL, TSL Data link layer Wapi
Database security
The SQLite used by Android currently uses plaintext to store data, and security involves encryption, reading and writing, searching, and so on. Encryption method Encryption Algorithm (Implementation method reference network) Permissions set permis
ContentProvider does not need to share data with other apps, declare android: exported = "false" in the manifest file. Note that in API Level 8 and earlier versions, even if you explicitly declare android: exported = "false", the corresponding ContentProvider can still be accessed by other apps.
[Restricted Access]
To be continued
[Example code that does not m
Mention Broadcastreceiver everyone is very familiar with it and Activity,service and ContentProvider and known as Android four components (four King Kong), visible broadcastreceiver the importance of Today we are mainly from a security perspective on the Broadcastreceiver called one of the four components. may have the child boots see here will have the question, Broadcastreceiver has what to say, is not fi
Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3501)
Release date:Updated on:
Affected Systems:Apache Group Cordova Description:--------------------------------------------------------------------------------Bugtraq id: 69041CVE (CAN) ID: CVE-2014-3501Apache Cordova is a platform for building local mobile applications using HTML, CSS, and JavaScript.Android apps built with Ap
Original address: http://www.javacodegeeks.com/2014/05/simple-tips-to-secure-android-app.html????????????????? Http://developer.android.com/training/articles/security-tips.html Android already has security features built into the operating system . significantly reduce the frequency and impact of Application
Release date:Updated on:
Affected Systems:Google Chrome for Android Description:--------------------------------------------------------------------------------Bugtraq id: 55523
Google Chrome is a simple and efficient Web browser tool developed by Google.
Google Chrome for Android before 18.0.1025308 has multiple vulnerabilities. Attackers can exploit these vulnerabilities to execute arbitrary code in th
Marshmallow Version Permissions ModificationThe Android privilege system has always been the primary security concept because these permissions are only asked once during installation. Once installed, the app can access everything in the right without the user's knowledge, and the average user rarely has to look at the list of permissions when it's installed, not to get a deeper understanding of the risks a
out whether private information is being compromised and therefore can be cut off from the transmission line. Because the firewall works in the operating system kernel, it cannot be directly violated by an external attack. At the same time, firewalls can work with the access control mechanisms provided by SE Android to provide a higher level of protection. However, malicious software does not disclose priv
it to the service in the intent, then you can use broadcast to return the results.0x02 Security suggestions
Service Category
Private service: it cannot be called by other applications. relatively secure public service: it can be called by any application. Cooperative service: it can only be called by applications of a trusted company. Internal service can only be called by internal applications.
Intent-filter and exported combination suggestions
S
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.