Home | History | Annotate | Download | only in security

Lines Matching full:application

31 consumers. To protect that value, the platform must offer an application
58 related to the browser or SMS application. Recommended best practices for
63 <p>Android provides an open source platform and application environment for mobile
80 <p><strong>Android Application Runtime</strong>: Android applications are most often written
85 Application Sandbox. Applications get a dedicated part of the filesystem in
102 environment supporting any third-party application. Google Play offers
114 application <a href="https://developer.android.com/guide/publishing/licensing.html">license
115 verification</a>, application security scanning, and other security services.</p>
123 <p><strong>Application Services</strong>: Frameworks that allow Android applications to use
125 up</a>) application
181 <li>Provide application isolation</li>
186 <li>Mandatory application sandbox for all applications</li>
188 <li>Application signing</li>
189 <li>Application-defined and user-granted permissions</li>
196 restricted by the Application Sandbox.</p>
204 native code is constrained by the Application Sandbox. Whether that code is
205 the result of included application behavior or a exploitation of an application
206 vulnerability, the system would prevent the rogue application from harming
234 <h2 id="the-application-sandbox">The Application Sandbox</h2>
236 means of identifying and isolating application resources. The Android system
237 assigns a unique user ID (UID) to each Android application and runs it as that user
241 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
245 limited access to the operating system. If application A tries to do something
246 malicious like read application B's data or dial the phone without permission
247 (which is a separate application), then the operating system protects against
248 this because application A does not have the appropriate user privileges. The
251 <p>Since the Application Sandbox is in the kernel, this security model extends to
253 kernel in <em>Figure 1</em>, including operating system libraries, application
254 framework, application runtime, and all applications run within the Application
257 On Android, there are no restrictions on how an application can be written that
264 the context of that particular application, with the permissions established by
266 <p>Like all security features, the Application Sandbox is not unbreakable.
267 However, to break out of the Application Sandbox in a properly configured
271 libraries, application runtime, application framework, and applications. This
278 alter or read another user's files. In the case of Android, each application
280 applications, files created by one application cannot be read or altered by
281 another application.</p>
357 application with root permissions from modifying the operating system, kernel,
358 and any other application. In general, root has full access to all
359 applications and all application data. Users that change the permissions on an
361 exposure to malicious applications and potential application flaws.
380 Encrypting data with a key stored on-device does not protect the application
384 present, but at some point the key must be provided to the application and it
428 built-in Android Email application uses the APIs to improve Exchange support.
429 Through the Email application, Exchange administrators can enforce password
439 <h1 id="android-application-security">Android Application Security</h1>
441 <p>Android provides an open source platform and application environment for mobile
447 <p>The main Android application building blocks are:</p>
454 receivers, and content providers described below) in an application. This also
462 Activities never display UIs. Typically, one of the application's Activities
463 is the entry point to an application.</p>
469 or in the context of another application's process. Other components "bind" to
481 is issued by the operating system or another application. An application may
488 <p>All applications on Android run in an Application Sandbox, described earlier in this document.
489 By default, an Android application can only access a limited range of system
490 resources. The system manages Android application access to resources that, if
497 with the per-application isolation of storage. In other instances, the
510 of the protected APIs on the device, an application must define the
512 application, the system displays a dialog to the user that indicates the
518 <p>Once granted, the permissions are applied to the application as long as it is
520 of the permissions granted to the application, and applications that are
522 permissions from the user. Permissions are removed if an application is
528 <p>In the event that an application attempts to use a protected feature which has
529 not been declared in the application's manifest, the permission failure will
530 typically result in a security exception being thrown back to the application.
532 prevent circumvention. An example of the user messaging when an application is
540 allowed to hold a permission. Details on creating and using application
551 applications have. Prior to installation of any application, the user is shown
552 a clear message about the different permissions the application is requesting.
556 application, developer, and functionality to determine whether it matches their
559 the application to other alternative applications.</p>
566 application if they feel uncomfortable.</p>
574 <p>Some platforms choose not to show any information at all about application
576 discussing application capabilities. While it is not possible for all users to
580 ask critical questions about application functionality and share their concerns
585 <td><strong>Permissions at Application Install -- Google Maps</strong></td>
586 Application -- gMail</strong></td>
590 <img alt="Permissions at Application Install -- Google Maps" width=250
594 <img alt="Permissions of an Installed Application -- gMail" width=250
620 "intention" to do something. For example, if your application wants to display
631 is used to access the user's list of contacts. An application can access data
632 that other applications have exposed via a ContentProvider, and an application
656 notification if an application attempts to send SMS to a short code that uses
658 whether to allow the application to send the message or block it.
680 indication of the types of information that may be provided to the application.
681 During installation, a third-party application may request permission to
682 access these resources. If permission is granted, the application can be
686 data restricted only to the specific application. If an application chooses to
687 make the data available to other applications though IPC, the application
693 microphone or GPS. For a third-party application to access these devices, it
697 <p>If an application wants to know the user's location, the application requires a
699 prompt the user asking if the application can access the user's location. At
700 any time, if the user does not want any application to access their location,
701 then the user can run the "Settings" application, go to "Location &amp; Security",
710 information. If an application requests access to this information at install
711 time, the installer will prompt the user asking if the application can access
712 the information. If the user does not grant access, the application will not be
714 <h2 id="application-signing">Application Signing</h2>
715 <p>Code signing allows developers to identify the author of the application and to
716 update their application without creating complicated interfaces and
717 permissions. Every application that is run on the Android platform must be
721 <p>On Google Play, application signing bridges the trust Google has with the
722 developer and the trust the developer has with their application. Developers
723 know their application is provided, unmodified to the Android device; and
724 developers can be held accountable for behavior of their application.</p>
725 <p>On Android, application signing is the first step to placing an application in
726 its Application Sandbox. The signed application certificate defines which user
727 id is associated with which application; different applications run under
728 different user IDs. Application signing ensures that one application cannot
729 access any other application except through well-defined IPC.</p>
730 <p>When an application (APK file) is installed onto an Android device, the Package
740 does not perform CA verification for application certificates.</p>
743 key while maintaining distinct UIDs and Application Sandboxes. A closer
744 relationship with a shared Application Sandbox is allowed via the
749 <h2 id="app-verification">Application Verification</h2>
751 Android 4.2 and later support application verification. Users can choose to
752 enable ?Verify Apps" and have applications evaluated by an application verifier
754 install an app that might be harmful; if an application is especially bad, it
770 application framework and runs through the Dalvik VM for standard applications.</p>
827 <p>Information for Android application developers is here: