Home | History | Annotate | Download | only in enhancements
      1 <html devsite>
      2   <head>
      3     <title>Security Enhancements in Android 1.5 through 4.1</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 
     24 
     25 
     26 <p>
     27 Android provides a multi-layered security model described in the <a href="/security/index.html">Android
     28 Security Overview</a>. Each update to Android includes dozens of
     29 security enhancements to protect users.  The following are some of the security
     30 enhancements introduced in Android versions 1.5 through 4.1:</p>
     31 
     32 <dl>
     33 <dt><strong>Android 1.5</strong></dt>
     34 <dd><ul>
     35 <li>ProPolice to prevent stack buffer overruns (-fstack-protector)</li>
     36 <li>safe_iop to reduce integer overflows</li>
     37 <li>Extensions to OpenBSD dlmalloc to prevent double free() vulnerabilities and
     38 to prevent chunk consolidation attacks.  Chunk consolidation attacks are a
     39 common way to exploit heap corruption.</li>
     40 <li>OpenBSD calloc to prevent integer overflows during memory allocation</li>
     41 </ul>
     42 </dd>
     43 
     44 <dt><strong>Android 2.3</strong></dt>
     45 <dd><ul>
     46 <li>Format string vulnerability protections (-Wformat-security -Werror=format-security)</li>
     47 <li>Hardware-based No eXecute (NX) to prevent code execution on the stack and heap</li>
     48 <li>Linux mmap_min_addr to mitigate null pointer dereference privilege
     49 escalation (further enhanced in Android 4.1)</li>
     50 </ul>
     51 </dd>
     52 
     53 <dt><strong>Android 4.0</strong></dt>
     54 <dd>Address Space Layout Randomization (ASLR) to randomize key locations in memory
     55 </dd>
     56 
     57 <dt><strong>Android 4.1</strong></dt>
     58 <dd><ul>
     59 <li>PIE (Position Independent Executable) support</li>
     60 <li>Read-only relocations / immediate binding (-Wl,-z,relro -Wl,-z,now)</li>
     61 <li>dmesg_restrict enabled (avoid leaking kernel addresses)</li>
     62 <li>kptr_restrict enabled (avoid leaking kernel addresses)</li>
     63 </ul>
     64 </dd>
     65 
     66 </dl>
     67 
     68   </body>
     69 </html>
     70