欢迎大家赞助一杯啤酒🍺 我们准备了下酒菜:Formal mathematics/Isabelle/ML, Formal verification/Coq/ACL2, C++/F#/Lisp
Android/security
来自开放百科 - 灰狐
(版本间的差异)
小 (→链接) |
小 (→链接) |
||
(未显示1个用户的5个中间版本) | |||
第1行: | 第1行: | ||
[[Android]] 安全相关 | [[Android]] 安全相关 | ||
+ | |||
+ | ==简介== | ||
+ | Android 使用安全增强型 Linux ([[SELinux]]) 对所有进程强制执行强制访问控制 (MAC),甚至包括以 Root/超级用户权限运行的进程(Linux 功能)。 | ||
==文档== | ==文档== | ||
*[http://docs.huihoo.com/rsaconference/usa-2012/Cracking-Open-the-Phone-An-Android-Malware-Automated-Analysis-Primer.pdf Cracking Open the Phone: An Android Malware Automated Analysis Primer] | *[http://docs.huihoo.com/rsaconference/usa-2012/Cracking-Open-the-Phone-An-Android-Malware-Automated-Analysis-Primer.pdf Cracking Open the Phone: An Android Malware Automated Analysis Primer] | ||
+ | *[http://docs.huihoo.com/rsaconference/usa-2014/mbs-w01-touchlogger-on-ios-and-android-v2.pdf Touchlogging on iOS and Android] | ||
+ | *[http://docs.huihoo.com/rsaconference/europe-2012/Deceiving-Permissions-Rules-for-Android-Malware-Detection.pdf Deceiving Permissions - Rules for Android Malware Detection] | ||
+ | *[http://docs.huihoo.com/rsaconference/europe-2012/Training-Employees-to-Recognise-and-Avoid-Advanced-Threats.pdf Training Employees to Recognise and Avoid Advanced Threats] | ||
+ | *[http://docs.huihoo.com/rsaconference/europe-2013/mbs-r02-android-malware-exposed-an-in-depth-look-at-its-evolution.pdf Android Malware Exposed - An In-depth Look at its Evolution] | ||
+ | |||
+ | ==图集== | ||
==链接== | ==链接== | ||
+ | *[https://source.android.com/security Android Security] | ||
*[http://blog.netqin.com/?p=1865 Android 病毒DroidDream分析报告] | *[http://blog.netqin.com/?p=1865 Android 病毒DroidDream分析报告] | ||
− | |||
− | |||
[[category:security]] | [[category:security]] | ||
[[category:android]] | [[category:android]] |
2022年4月26日 (二) 11:45的最后版本
Android 安全相关
目录 |
[编辑] 简介
Android 使用安全增强型 Linux (SELinux) 对所有进程强制执行强制访问控制 (MAC),甚至包括以 Root/超级用户权限运行的进程(Linux 功能)。
[编辑] 文档
- Cracking Open the Phone: An Android Malware Automated Analysis Primer
- Touchlogging on iOS and Android
- Deceiving Permissions - Rules for Android Malware Detection
- Training Employees to Recognise and Avoid Advanced Threats
- Android Malware Exposed - An In-depth Look at its Evolution
[编辑] 图集
[编辑] 链接
分享您的观点