wip
All checks were successful
/ test_checkout (push) Successful in 1m5s

This commit is contained in:
Jean-Marie 'Histausse' Mineau 2025-07-30 01:11:04 +02:00
parent c060e88996
commit 89c7f6ef08
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
2 changed files with 45 additions and 3 deletions

View file

@ -1,4 +1,4 @@
#import "../lib.typ": todo, epigraph
#import "../lib.typ": todo, epigraph, eg
= Introduction <sec:intro>
@ -10,8 +10,13 @@
Android is the most used mobile operating system since 2014, and since 2017, it even surpasses Windows all platforms combined#footnote[https://gs.statcounter.com/os-market-share#monthly-200901-202304].
The public adoption of Android is confirmed by application developers, with 1.3 millions apps available in the Google Play Store in 2014, and 3.5 millions apps available in 2017#footnote[https://www.statista.com/statistics/266210].
Its popularity makes Android a prime target for malware developers.
For example, various applications have been shown to steal personal information~@shanSelfhidingBehaviorAndroid2018.
Consequently, Android has also been an important subject for security research.
Various applications have been shown to behave maliciously, from stealing personal informations~@shanSelfhidingBehaviorAndroid2018 to hijacking the phone computing ressources to mine cryptocurrency~@adjibi_devil_2022.
Considering the importance of Android in the everyday live of so many people, Google, the company that develops Android, defined a very strong security model that addresses an extensive threat model~@mayrhofer_android_2021.
This threat model goes as far as to consider that an adversarie can have physical access to an unlocked device (#eg an abusive partner, or a border control). // Americaaaaa
On the device, this security model imply the sandboxing of each applications, with a system of permissions to allow the applications to perform potentially unwanted actions.
For example, an applications cannot access the contact list without requesting the permission to the user first.
Android keep improving its security version from version, be it by improving the sandboxing (#eg starting with Android 10, application can no longer access the clipboard if they are not focused) or safer default (#eg since Android 9, by default, all network connection must use TLS).
/*
* A mettre qqp:
@ -41,3 +46,4 @@ Consequently, Android has also been an important subject for security research.
#todo[3) savent pas gerer le chargement dyn et reflection]