This commit is contained in:
parent
c060e88996
commit
89c7f6ef08
2 changed files with 45 additions and 3 deletions
|
@ -1,4 +1,4 @@
|
|||
#import "../lib.typ": todo, epigraph
|
||||
#import "../lib.typ": todo, epigraph, eg
|
||||
|
||||
= Introduction <sec:intro>
|
||||
|
||||
|
@ -10,8 +10,13 @@
|
|||
Android is the most used mobile operating system since 2014, and since 2017, it even surpasses Windows all platforms combined#footnote[https://gs.statcounter.com/os-market-share#monthly-200901-202304].
|
||||
The public adoption of Android is confirmed by application developers, with 1.3 millions apps available in the Google Play Store in 2014, and 3.5 millions apps available in 2017#footnote[https://www.statista.com/statistics/266210].
|
||||
Its popularity makes Android a prime target for malware developers.
|
||||
For example, various applications have been shown to steal personal information~@shanSelfhidingBehaviorAndroid2018.
|
||||
Consequently, Android has also been an important subject for security research.
|
||||
Various applications have been shown to behave maliciously, from stealing personal informations~@shanSelfhidingBehaviorAndroid2018 to hijacking the phone computing ressources to mine cryptocurrency~@adjibi_devil_2022.
|
||||
|
||||
Considering the importance of Android in the everyday live of so many people, Google, the company that develops Android, defined a very strong security model that addresses an extensive threat model~@mayrhofer_android_2021.
|
||||
This threat model goes as far as to consider that an adversarie can have physical access to an unlocked device (#eg an abusive partner, or a border control). // Americaaaaa
|
||||
On the device, this security model imply the sandboxing of each applications, with a system of permissions to allow the applications to perform potentially unwanted actions.
|
||||
For example, an applications cannot access the contact list without requesting the permission to the user first.
|
||||
Android keep improving its security version from version, be it by improving the sandboxing (#eg starting with Android 10, application can no longer access the clipboard if they are not focused) or safer default (#eg since Android 9, by default, all network connection must use TLS).
|
||||
|
||||
/*
|
||||
* A mettre qqp:
|
||||
|
@ -41,3 +46,4 @@ Consequently, Android has also been an important subject for security research.
|
|||
|
||||
#todo[3) savent pas gerer le chargement dyn et reflection]
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue