3. The android security framework
The Android Security Framework (ASF) provides a cross-layer security solution (i.e. sandboxing) built by combining native
per-layer security mechanisms. Each layer in the Android stack (except the Libraries layer) comes with its own security
mechanisms:
• Application layer (Android Permissions). Each application comes with a file named AndroidManifest.xml that
contains the description of the components composing the application as well as the permissions that the application
may require during execution. The user is asked to grant all the permissions specified in the manifest to properly install
and execute the application.
• Application Framework (Permission Enforcement). At runtime, services at this layer enforce the permissions specified
in the manifest and granted by the user during installation.
• Runtime (VM Isolation). Each application is executed in a separate Dalvik VM machine. This ensures isolation among
applications.
• Linux (Access Control). As in any Linux kernel, resources are mapped into files (e.g. sockets, drivers). The Linux
Discretionary Access Control (DAC) model associates each file with an owner and a group. Then, DAC model allows the
owner to assign an access control list (i.e. read, write, and/or execute) on each file to the owner itself (UID), the owner’s
group (GID) and other users.
3. The android security frameworkThe Android Security Framework (ASF) provides a cross-layer security solution (i.e. sandboxing) built by combining nativeper-layer security mechanisms. Each layer in the Android stack (except the Libraries layer) comes with its own securitymechanisms:• Application layer (Android Permissions). Each application comes with a file named AndroidManifest.xml thatcontains the description of the components composing the application as well as the permissions that the applicationmay require during execution. The user is asked to grant all the permissions specified in the manifest to properly installand execute the application.• Application Framework (Permission Enforcement). At runtime, services at this layer enforce the permissions specifiedin the manifest and granted by the user during installation.• Runtime (VM Isolation). Each application is executed in a separate Dalvik VM machine. This ensures isolation amongapplications.• Linux (Access Control). As in any Linux kernel, resources are mapped into files (e.g. sockets, drivers). The LinuxDiscretionary Access Control (DAC) model associates each file with an owner and a group. Then, DAC model allows theowner to assign an access control list (i.e. read, write, and/or execute) on each file to the owner itself (UID), the owner’sgroup (GID) and other users.
การแปล กรุณารอสักครู่..
