1、 毕业设计(论文)毕业设计(论文) 外文资料翻译外文资料翻译 题目 学 院 数学与信息科学 专 业 信息与计算科学 班 级 学 号 学生姓名 指导教师 1 Security in Android 1. ANDROID PLATFORM MAIN BUILDING BLOCKS 2. SYSTEMANDKERNELLEVELSECURITY 3. USER SECURITY 4. APPLICATION SECURITY 5. CONCLUSION Author: Amritesh Kumar Sharma,Arun Kumar Singh,Pankaj P. Singh From :Inter
2、nation Journal of Computer in this respect, native code is just as secure as interpreted code. In some operating systems, memory corruption errors generally lead to completely compromising the security of the device. This is not the case in Android due to all applications and their resources being s
3、andboxed at the OS level. A memory corruption error will only allow arbitrary code execution in the context of that particular application, with the permissions established by the operating system. Like all security features, the Application Sandbox is not unbreakable. However, to break out of the A
4、pplication Sandbox in a properly configured device, one must compromise the security of the Linux kernel. 2.3 Filesystem Permissions Filesystem permissions ensure that one user cannot alter or read another users files. In the case of Android, each application runs as its own user. Unless the develop
5、er explicitly exposes files to other applications, files created by one application cannot be read or altered by another application5. 2.4 Cryptography Android provides a set of cryptographic APIs for use by applications. These include 12 implementations of standard and commonly used cryptographic p
6、rimitives such as AES, RSA, DSA, and SHA. Additionally, APIs are provided for higher level protocols such as SSL and HTTPS. 3. USER SECURITY 3.1 Filesystem Encryption Full filesystem encryption was provided by Android 3.0 and later, so all user data can be encrypted in the kernel using the dmcrypt implementation of AES128 with CBC and ESSIV: SHA256. The encryption key is protected by AES128 using a key derived from the user password, preventing unauthorized access to stored