Home | History | Annotate | Download | only in overview
      1 <html devsite>
      2   <head>
      3     <title>Application security</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 
     24 
     25 
     26 <h2 id="elements-of-applications">Elements of Applications</h2>
     27 <p>Android provides an open source platform and application environment for mobile
     28   devices. The core operating system is based on the Linux kernel. Android
     29   applications are most often written in the Java programming language and run in
     30   the Dalvik virtual machine. However, applications can also be written in native
     31   code. Applications are installed from a single file with the .apk file
     32   extension.</p>
     33 <p>The main Android application building blocks are:</p>
     34 <ul>
     35   <li>
     36     <p><strong>AndroidManifest.xml</strong>: The <a
     37       href="https://developer.android.com/guide/topics/manifest/manifest-intro.html">AndroidManifest.xml</a>
     38       file is the control file that tells the system what to do with
     39       all the top-level components (specifically activities, services, broadcast
     40       receivers, and content providers described below) in an application. This also
     41       specifies which permissions are required.</p>
     42   </li>
     43   <li>
     44     <p><strong>Activities</strong>: An <a
     45       href="https://developer.android.com/guide/topics/fundamentals/activities.html">Activity</a>
     46       is, generally, the code for a single, user-focused task.  It usually
     47       includes displaying a UI to the user, but it does not have to -- some
     48       Activities never display UIs.  Typically, one of the application's Activities
     49       is the entry point to an application.</p>
     50   </li>
     51   <li>
     52     <p><strong>Services</strong>: A <a
     53       href="https://developer.android.com/guide/topics/fundamentals/services.html">Service</a>
     54       is a body of code that runs in the background. It can run in its own
     55       process, or in the context of another application's process. Other components "bind" to
     56       a Service and invoke methods on it via remote procedure calls. An example of a
     57       Service is a media player: even when the user quits the media-selection UI, the
     58       user probably still intends for music to keep playing. A Service keeps the
     59       music going even when the UI has completed.</p>
     60   </li>
     61   <li>
     62     <p><strong>Broadcast Receiver</strong>: A <a
     63       href="https://developer.android.com/reference/android/content/BroadcastReceiver.html">BroadcastReceiver</a>
     64       is an object that is instantiated when an IPC mechanism
     65       known as an <a
     66         href="https://developer.android.com/reference/android/content/Intent.html">Intent</a>
     67       is issued by the operating system or another application.  An application
     68       may register a receiver for the low battery message, for example, and
     69       change its behavior based on that information.</p>
     70   </li>
     71 </ul>
     72 <h2 id="the-android-permission-model-accessing-protected-apis">The Android Permission Model: Accessing Protected APIs</h2>
     73 <p>All applications on Android run in an <a
     74 href="/security/overview/kernel-security#the-application-sandbox">Application Sandbox</a>.
     75   By default, an Android application can only access a limited range of system
     76   resources. The system manages Android application access to resources that, if
     77   used incorrectly or maliciously, could adversely impact the user experience,
     78   the network, or data on the device.</p>
     79 <p>These restrictions are implemented in a variety of different forms.  Some
     80   capabilities are restricted by an intentional lack of APIs to the sensitive
     81   functionality (e.g. there is no Android API for directly manipulating the SIM
     82   card).  In some instances, separation of roles provides a security measure, as
     83   with the per-application isolation of storage. In other instances, the
     84   sensitive APIs are intended for use by trusted applications and protected
     85   through a security mechanism known as Permissions.</p>
     86 <p>These protected APIs include:</p>
     87 <ul>
     88   <li>Camera functions</li>
     89   <li>Location data (GPS)</li>
     90   <li>Bluetooth functions</li>
     91   <li>Telephony functions</li>
     92   <li>SMS/MMS functions</li>
     93   <li>Network/data connections</li>
     94 </ul>
     95 <p>These resources are only accessible through the operating system.  To make use
     96   of the protected APIs on the device, an application must define the
     97   capabilities it needs in its manifest.  When preparing to install an
     98   application, the system displays a dialog to the user that indicates the
     99   permissions requested and asks whether to continue the installation.  If the
    100   user continues with the installation, the system accepts that the user has
    101   granted all of the requested permissions. The user can not grant or deny
    102   individual permissions -- the user must grant or deny all of the requested
    103   permissions as a block.</p>
    104 <p>Once granted, the permissions are applied to the application as long as it is
    105   installed.  To avoid user confusion, the system does not notify the user again
    106   of the permissions granted to the application, and applications that are
    107   included in the core operating system or bundled by an OEM do not request
    108   permissions from the user. Permissions are removed if an application is
    109   uninstalled, so a subsequent re-installation will again result in display of
    110   permissions.</p>
    111 <p>Within the device settings, users are able to view permissions for applications
    112   they have previously installed. Users can also turn off some functionality
    113   globally when they choose, such as disabling GPS, radio, or wi-fi.</p>
    114 <p>In the event that an application attempts to use a protected feature which has
    115   not been declared in the application's manifest, the permission failure will
    116   typically result in a security exception being thrown back to the application.
    117   Protected API permission checks are enforced at the lowest possible level to
    118   prevent circumvention. An example of the user messaging when an application is
    119   installed while requesting access to protected APIs is shown in <em>Figure 2</em>.</p>
    120 <p>The system default permissions are described at <a href="https://developer.android.com/reference/android/Manifest.permission.html">https://developer.android.com/reference/android/Manifest.permission.html</a>.
    121   Applications may declare their own permissions for other applications to use.
    122   Such permissions are not listed in the above location.</p>
    123 <p>When defining a permission a protectionLevel attribute tells the system how the
    124   user is to be informed of applications requiring the permission, or who is
    125   allowed to hold a permission. Details on creating and using application
    126   specific permissions are described at <a href="https://develo
    127 per.android.com/guide/topics/security/security.html">https://developer.android.com/guide/topics/security/security.html</a>.</p>
    128 <p>There are some device capabilities, such as the ability to send SMS broadcast
    129   intents, that are not available to third-party applications, but that may be
    130   used by applications pre-installed by the OEM. These permissions use the
    131   signatureOrSystem permission.</p>
    132 <h2 id="how-users-understand-third-party-applications">How Users Understand Third-Party Applications</h2>
    133 <p>Android strives to make it clear to users when they are interacting with
    134   third-party applications and inform the user of the capabilities those
    135   applications have.  Prior to installation of any application, the user is shown
    136   a clear message about the different permissions the application is requesting.
    137   After install, the user is not prompted again to confirm any permissions.</p>
    138 <p>There are many reasons to show permissions immediately prior to installation
    139   time. This is when user is actively reviewing information about the
    140   application, developer, and functionality to determine whether it matches their
    141   needs and expectations.  It is also important that they have not yet
    142   established a mental or financial commitment to the app, and can easily compare
    143   the application to other alternative applications.</p>
    144 <p>Some other platforms use a different approach to user notification, requesting
    145   permission at the start of each session or while applications are in use. The
    146   vision of Android is to have users switching seamlessly between applications at
    147   will. Providing confirmations each time would slow down the user and prevent
    148   Android from delivering a great user experience. Having the user review
    149   permissions at install time gives the user the option to not install the
    150   application if they feel uncomfortable.</p>
    151 <p>Also, many user interface studies have shown that over-prompting the user
    152   causes the user to start saying "OK" to any dialog that is shown. One of
    153   Android's security goals is to effectively convey important security
    154   information to the user, which cannot be done using dialogs that the user will
    155   be trained to ignore. By presenting the important information once, and only
    156   when it is important, the user is more likely to think about what they are
    157   agreeing to.</p>
    158 <p>Some platforms choose not to show any information at all about application
    159   functionality. That approach prevents users from easily understanding and
    160   discussing application capabilities. While it is not possible for all users to
    161   always make fully informed decisions, the Android permissions model makes
    162   information about applications easily accessible to a wide range of users.  For
    163   example, unexpected permissions requests can prompt more sophisticated users to
    164   ask critical questions about application functionality and share their concerns
    165   in places such as <a href="htts://play.google.com">Google Play</a> where they
    166   are visible to all users.</p>
    167 <table>
    168   <tr>
    169     <td><strong>Permissions at Application Install -- Google Maps</strong></td>
    170     <td><strong>Permissions of an Installed Application -- Gmail</strong></td>
    171   </tr>
    172   <tr>
    173     <td><img alt="Permissions at Application Install -- Google Maps" width=250
    174 src="../images/image_install.png" /></td>
    175     <td><img alt="Permissions of an Installed Application -- Gmail" width=250
    176 src="../images/image_gmail_installed.png" id="figure1" /></td>
    177   </tr>
    178 </table>
    179 <p class="img-caption">
    180   <strong>Figure 1.</strong> Display of permissions for applications
    181 </p>
    182 <h2 id="interprocess-communication">Interprocess Communication</h2>
    183 <p>Processes can communicate using any of the traditional UNIX-type mechanisms.
    184   Examples include the filesystem, local sockets, or signals. However, the Linux
    185   permissions still apply.</p>
    186 <p>Android also provides new IPC mechanisms:</p>
    187 <ul>
    188   <li>
    189     <p><strong>Binder</strong>: A lightweight capability-based remote procedure call mechanism
    190       designed for high performance when performing in-process and cross-process
    191       calls. Binder is implemented using a custom Linux driver. See <a href="https://developer
    192 .android.com/reference/android/os/Binder.html">https://developer.android.com/reference/android/os/Binder.html</a>.</p>
    193   </li>
    194   <li>
    195     <p><strong>Services</strong>: Services (discussed above) can provide interfaces directly
    196       accessible using binder.</p>
    197   </li>
    198   <li>
    199     <p><strong>Intents</strong>: An Intent is a simple message object that represents an
    200       "intention" to do something. For example, if your application wants to display
    201       a web page, it expresses its "Intent" to view the URL by creating an Intent
    202       instance and handing it off to the system. The system locates some other piece
    203       of code (in this case, the Browser) that knows how to handle that Intent, and
    204       runs it. Intents can also be used to broadcast interesting events (such as a
    205       notification) system-wide. See
    206       <a href="https://developer.android.com/reference/android/content/Intent.html">https://developer.android.com/reference/android/content/Intent.html</a>.</p>
    207   </li>
    208   <li>
    209     <p><strong>ContentProviders</strong>: A ContentProvider is a data storehouse that provides
    210       access to data on the device; the classic example is the ContentProvider that
    211       is used to access the user's list of contacts. An application can access data
    212       that other applications have exposed via a ContentProvider, and an application
    213       can also define its own ContentProviders to expose data of its own. See <a href="https://developer.android.com/reference/android/content/ContentProvider.html">https://developer.android.com/reference/android/content/ContentProvider.html</a>.</p>
    214   </li>
    215 </ul>
    216 <p>While it is possible to implement IPC using other mechanisms such as network
    217   sockets or world-writable files, these are the recommended Android IPC
    218   frameworks. Android developers will be encouraged to use best practices around
    219   securing users' data and avoiding the introduction of security vulnerabilities.</p>
    220 <h2 id="cost-sensitive-apis">Cost-Sensitive APIs</h2>
    221 <p>A cost sensitive API is any function that might generate a cost for the user or
    222   the network. The Android platform has placed cost sensitive APIs in the list of
    223   protected APIs controlled by the OS. The user will have to grant explicit
    224   permission to third-party applications requesting use of cost sensitive APIs.
    225   These APIs include:</p>
    226 <ul>
    227   <li>Telephony</li>
    228   <li>SMS/MMS</li>
    229   <li>Network/Data</li>
    230   <li>In-App Billing</li>
    231   <li>NFC Access</li>
    232 </ul>
    233 <p> Android 4.2 adds further control on the use of SMS. Android will provide a
    234   notification if an application attempts to send SMS to a short code that uses
    235   premium services which might cause additional charges.  The user can choose
    236   whether to allow the application to send the message or block it. </p>
    237 <h2 id="sim-card-access">SIM Card Access</h2>
    238 <p>Low level access to the SIM card is not available to third-party apps. The OS
    239   handles all communications with the SIM card including access to personal
    240   information (contacts) on the SIM card memory. Applications also cannot access
    241   AT commands, as these are managed exclusively by the Radio Interface Layer
    242   (RIL). The RIL provides no high level APIs for these commands.</p>
    243 <h2 id="personal-information">Personal Information</h2>
    244 <p>Android has placed APIs that provide access to user data into the set of
    245   protected APIs.  With normal usage, Android devices will also accumulate user
    246   data within third-party applications installed by users.   Applications that
    247   choose to share this information can use Android OS permission checks to
    248   protect the data from third-party applications.</p>
    249 <img alt="Access to sensitive user data available only through protected
    250 APIs" src="../images/permissions_check.png" id="figure2" />
    251 <p class="img-caption">
    252   <strong>Figure 2.</strong> Access to sensitive user data is available only through protected APIs
    253 </p>
    254 <p>System content providers that are likely to contain personal or personally
    255   identifiable information such as contacts and calendar have been created with
    256   clearly identified permissions. This granularity provides the user with clear
    257   indication of the types of information that may be provided to the application.
    258   During installation, a third-party application may request permission to
    259   access these resources.  If permission is granted, the application can be
    260   installed and will have access to the data requested at any time when it is
    261   installed.</p>
    262 <p>Any applications which collect personal information will, by default, have that
    263   data restricted only to the specific application.  If an application chooses to
    264   make the data available to other applications though IPC, the application
    265   granting access can apply permissions to the IPC mechanism that are enforced by
    266   the operating system.</p>
    267 <h2 id="sensitive-data-input-devices">Sensitive Data Input Devices</h2>
    268 <p>Android devices frequently provide sensitive data input devices that allow
    269   applications to interact with the surrounding environment, such as camera,
    270   microphone or GPS.  For a third-party application to access these devices, it
    271   must first be explicitly provided access by the user through the use of Android
    272   OS Permissions.  Upon installation, the installer will prompt the user
    273   requesting permission to the sensor by name.</p>
    274 <p>If an application wants to know the user's location, the application requires a
    275   permission to access the user's location. Upon installation, the installer will
    276   prompt the user asking if the application can access the user's location. At
    277   any time, if the user does not want any application to access their location,
    278   then the user can run the "Settings" application, go to "Location &amp; Security",
    279   and uncheck the "Use wireless networks" and "Enable GPS satellites". This will
    280   disable location based services for all applications on the user's device.</p>
    281 <h2 id="device-metadata">Device Metadata</h2>
    282 <p>Android also strives to restrict access to data that is not intrinsically
    283   sensitive, but may indirectly reveal characteristics about the user, user
    284   preferences, and the manner in which they use a device.</p>
    285 <p>By default applications do not have access to operating system logs,
    286   browser history, phone number, or hardware / network identification
    287   information.  If an application requests access to this information at install
    288   time, the installer will prompt the user asking if the application can access
    289   the information. If the user does not grant access, the application will not be
    290   installed.</p>
    291 <h2 id="certificate-authorities">Certificate authorities</h2>
    292 <p>
    293 Android includes a set of installed system Certificate Authorities, which are
    294 trusted system-wide. Prior to Android 7.0, device manufacturers could modify the
    295 set of CAs shipped on their devices. However, devices running 7.0 and above will
    296 have a uniform set of system CAs as modification by device manufacturers is no
    297 longer permitted.
    298 </p>
    299 <p>
    300 To be added as a new public CA to the Android stock set, the CA must complete
    301 the <a href="https://wiki.mozilla.org/CA:How_to_apply">Mozilla CA Inclusion
    302 Process</a> and then file a feature request against Android (<a
    303 href="https://code.google.com/p/android/issues/entry">https://code.google.com/p/android/issues/entry</a>)
    304 to have the CA added to the stock Android CA set in the <a
    305 href="https://android.googlesource.com/">Android Open Source Project</a>
    306 (AOSP).
    307 </p>
    308 <p>
    309 There are still CAs that are device-specific and should not be included in the
    310 core set of AOSP CAs, like carriers private CAs that may be needed to securely
    311 access components of the carriers infrastructure, such as SMS/MMS gateways.
    312 Device manufacturers are encouraged to include the private CAs only in the
    313 components/apps that need to trust these CAs. See <a
    314 href="https://developer.android.com/preview/features/security-config.html">Network
    315 Security Configuration</a> for more details.
    316 </p>
    317 <h2 id="application-signing">Application Signing</h2>
    318 <p><a href="/security/apksigning/index.html">Code signing</a>
    319   allows developers to identify the author of the application and to
    320   update their application without creating complicated interfaces and
    321   permissions. Every application that is run on the Android platform must be
    322   signed by the developer.  Applications that attempt to install without being
    323   signed will rejected by either Google Play or the package installer on
    324   the Android device.</p>
    325 <p>On Google Play, application signing bridges the trust Google has with the
    326   developer and the trust the developer has with their application.  Developers
    327   know their application is provided, unmodified to the Android device; and
    328   developers can be held accountable for behavior of their application.</p>
    329 <p>On Android, application signing is the first step to placing an application in
    330   its Application Sandbox. The signed application certificate defines which user
    331   id is associated with which application; different applications run under
    332   different user IDs. Application signing ensures that one application cannot
    333   access any other application except through well-defined IPC.</p>
    334 <p>When an application (APK file) is installed onto an Android device, the Package
    335   Manager verifies that the APK has been properly signed with the certificate
    336   included in that APK.  If the certificate (or, more accurately, the public key
    337   in the certificate) matches the key used to sign any other APK on the device,
    338   the new APK has the option to specify in the manifest that it will share a UID
    339   with the other similarly-signed APKs.</p>
    340 <p>Applications can be signed by a third-party (OEM, operator, alternative market)
    341   or self-signed. Android provides code signing using self-signed certificates
    342   that developers can generate without external assistance or permission.
    343   Applications do not have to be signed by a central authority. Android currently
    344   does not perform CA verification for application certificates.</p>
    345 <p>Applications are also able to declare security permissions at the Signature
    346   protection level, restricting access only to applications signed with the same
    347   key while maintaining distinct UIDs and Application Sandboxes. A closer
    348   relationship with a shared Application Sandbox is allowed via the <a href="https://developer.android.com/guide/topics/manifest/manifest-element.html#uid">shared UID
    349     feature</a> where two or more applications signed with same developer key can
    350   declare a shared UID in their manifest.</p>
    351 <h2 id="app-verification">Application Verification</h2>
    352 <p> Android 4.2 and later support application verification. Users can choose to
    353   enable Verify Apps" and have applications evaluated by an application verifier
    354   prior to installation.  App verification can alert the user if they try to
    355   install an app that might be harmful; if an application is especially bad, it
    356   can block installation. </p>
    357 <h2 id="digital-rights-management">Digital Rights Management</h2>
    358 <p>The Android platform provides an extensible DRM framework that lets
    359   applications manage rights-protected content according to the license
    360   constraints that are associated with the content. The DRM framework supports
    361   many DRM schemes; which DRM schemes a device supports is left to the device
    362   manufacturer.</p>
    363 <p>The <a href="https://developer.android.com/reference/android/drm/package-summary.html">Android DRM
    364   framework</a> is implemented in two architectural layers (see figure below):</p>
    365 <ul>
    366   <li>
    367     <p>A DRM framework API, which is exposed to applications through the Android
    368       application framework and runs through the Dalvik VM for standard applications.</p>
    369   </li>
    370   <li>
    371     <p>A native code DRM manager, which implements the DRM framework and exposes an
    372       interface for DRM plug-ins (agents) to handle rights management and decryption
    373       for various DRM schemes</p>
    374   </li>
    375 </ul>
    376 <p><img alt="Architecture of Digital Rights Management on Android
    377 platform" src="/devices/images/ape_fwk_drm_2.png" id="figure3" /></p>
    378 <p class="img-caption">
    379   <strong>Figure 3.</strong> Architecture of Digital Rights Management on Android platform
    380 </p>
    381 
    382   </body>
    383 </html>
    384