SlideShare a Scribd company logo
Android Security Essentials




                                    Pragati Ogal Rai
                       Mobile Technology Evangelist
                  X.commerce (an eBay Inc. Company)














Android OS Architecture




http://developer.android.com/guide/basics/what-is-android.html



include/linux/android_aid.h


















    android.permission.VIBRATE

    com.android.alarm.permission.SET_ALARM



    android.permission.SEND_SMS

    android.permission.CALL_PHONE



    android.permission.FORCE_STOP_PACKAGES

    android.permission.INJECT_EVENTS



    android.permission.ACCESS_USB

    android.permission.SET_TIME
<permission
  android:name="com.pragati.permission.ACCESS_DETAILS"
  android:label="@string/permlab_accessDetails"
  android:description="@string/permdesc_accessDetails"
  android:permissionGroup="android.permission-
  group.COST_MONEY"
  android:protectionLevel=“signature" />
















 transact()   Binder.onTransact()














    startActivity(Intent), startBroadcast(Intent)

    <receiver android:name=“BootCompletedReceiver”>

      <intent-filter>

          <action android:name=“android.intent.action.BOOT_COMPLETED”/>

      </intent-filter>

    </receiver>








    android.intent.category.BROWSEABLE









    PendingIntent.getActivity(Context, int, Intent, int)














    –
    –


    –
    –















    –

    –

    –


    –
























Thank you!



                                   pragati@x.com
                                     @pragatiogal
             http://www.slideshare.net/pragatiogal

More Related Content

Viewers also liked (20)

PDF
Metasploit - The Exploit Learning Tree
E Hacking
 
PDF
[Wroclaw #3] SELinux 101
OWASP
 
PDF
iOS Application Penetation Test
JongWon Kim
 
PDF
HTTPs Strict Transport Security
Gol D Roger
 
PDF
Pentesting RESTful WebServices v1.0
n|u - The Open Security Community
 
PDF
Introduction to iOS Penetration Testing
OWASP
 
PDF
Andriod Pentesting and Malware Analysis
n|u - The Open Security Community
 
PDF
Reverse Engineering iOS apps
Max Bazaliy
 
PDF
Sperasoft talks: Android Security Threats
Sperasoft
 
PPTX
Permission in Android Security: Threats and solution
Tandhy Simanjuntak
 
PPTX
Pentesting ReST API
Nutan Kumar Panda
 
PDF
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
 
PDF
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
OWASP
 
PPTX
JSON SQL Injection and the Lessons Learned
Kazuho Oku
 
PDF
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
 
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
 
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava
 
PDF
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 
Metasploit - The Exploit Learning Tree
E Hacking
 
[Wroclaw #3] SELinux 101
OWASP
 
iOS Application Penetation Test
JongWon Kim
 
HTTPs Strict Transport Security
Gol D Roger
 
Pentesting RESTful WebServices v1.0
n|u - The Open Security Community
 
Introduction to iOS Penetration Testing
OWASP
 
Andriod Pentesting and Malware Analysis
n|u - The Open Security Community
 
Reverse Engineering iOS apps
Max Bazaliy
 
Sperasoft talks: Android Security Threats
Sperasoft
 
Permission in Android Security: Threats and solution
Tandhy Simanjuntak
 
Pentesting ReST API
Nutan Kumar Panda
 
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
 
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
OWASP
 
JSON SQL Injection and the Lessons Learned
Kazuho Oku
 
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 

Similar to Android Security Essentials (20)

PPTX
Amphion Forum: Understanding Android Secuity
Pragati Rai
 
PDF
Understanding the Android System Server
Opersys inc.
 
PDF
Android securitybyexample
Pragati Rai
 
PDF
DEFCON 18- These Aren't the Permissions You're Looking For
Michael Scovetta
 
PPTX
Understanding android security model
Pragati Rai
 
PDF
Java For Mobile Devices – Building a client application for the Android platform
IndicThreads
 
PDF
Java For Mobile Devices – Building a client application for the Android platform
IndicThreads
 
PPTX
Android training course
Adarsh Pandey
 
PDF
Android101
David Marques
 
PPTX
Android Security
Arqum Ahmad
 
PPT
Securely Deploying Android Device - ISSA (Ireland)
Angelill0
 
PDF
Deep Dive Into Android Security
Marakana Inc.
 
PDF
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Opersys inc.
 
PPTX
Android Training (android fundamental)
Khaled Anaqwa
 
PDF
Introduction to Android M
amsanjeev
 
PPTX
What's new in android M(6.0)
Yonatan Levin
 
DOCX
Using intents in android
Oum Saokosal
 
PPTX
Data Transfer between activities and Database
faiz324545
 
PPTX
Basics of Android
sabi_123
 
PPTX
Android Security Humla Part 1
Nikhil Kulkarni
 
Amphion Forum: Understanding Android Secuity
Pragati Rai
 
Understanding the Android System Server
Opersys inc.
 
Android securitybyexample
Pragati Rai
 
DEFCON 18- These Aren't the Permissions You're Looking For
Michael Scovetta
 
Understanding android security model
Pragati Rai
 
Java For Mobile Devices – Building a client application for the Android platform
IndicThreads
 
Java For Mobile Devices – Building a client application for the Android platform
IndicThreads
 
Android training course
Adarsh Pandey
 
Android101
David Marques
 
Android Security
Arqum Ahmad
 
Securely Deploying Android Device - ISSA (Ireland)
Angelill0
 
Deep Dive Into Android Security
Marakana Inc.
 
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Opersys inc.
 
Android Training (android fundamental)
Khaled Anaqwa
 
Introduction to Android M
amsanjeev
 
What's new in android M(6.0)
Yonatan Levin
 
Using intents in android
Oum Saokosal
 
Data Transfer between activities and Database
faiz324545
 
Basics of Android
sabi_123
 
Android Security Humla Part 1
Nikhil Kulkarni
 
Ad

More from OSCON Byrum (20)

PDF
OSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON Byrum
 
PDF
Protecting Open Innovation with the Defensive Patent License
OSCON Byrum
 
PDF
Using Cascalog to build an app with City of Palo Alto Open Data
OSCON Byrum
 
PPTX
Finite State Machines - Why the fear?
OSCON Byrum
 
PDF
Open Source Automotive Development
OSCON Byrum
 
PPTX
How we built our community using Github - Uri Cohen
OSCON Byrum
 
PDF
The Vanishing Pattern: from iterators to generators in Python
OSCON Byrum
 
PDF
Distributed Coordination with Python
OSCON Byrum
 
PDF
An overview of open source in East Asia (China, Japan, Korea)
OSCON Byrum
 
PPTX
Oscon 2013 Jesse Anderson
OSCON Byrum
 
PDF
US Patriot Act OSCON2012 David Mertz
OSCON Byrum
 
PPTX
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON Byrum
 
PPTX
Big Data for each one of us
OSCON Byrum
 
KEY
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
OSCON Byrum
 
PDF
Declarative web data visualization using ClojureScript
OSCON Byrum
 
PDF
Using and Building Open Source in Google Corporate Engineering - Justin McWil...
OSCON Byrum
 
PDF
A Look at the Network: Searching for Truth in Distributed Applications
OSCON Byrum
 
PPT
Life After Sharding: Monitoring and Management of a Complex Data Cloud
OSCON Byrum
 
PPT
Faster! Faster! Accelerate your business with blazing prototypes
OSCON Byrum
 
PDF
Comparing open source private cloud platforms
OSCON Byrum
 
OSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON Byrum
 
Protecting Open Innovation with the Defensive Patent License
OSCON Byrum
 
Using Cascalog to build an app with City of Palo Alto Open Data
OSCON Byrum
 
Finite State Machines - Why the fear?
OSCON Byrum
 
Open Source Automotive Development
OSCON Byrum
 
How we built our community using Github - Uri Cohen
OSCON Byrum
 
The Vanishing Pattern: from iterators to generators in Python
OSCON Byrum
 
Distributed Coordination with Python
OSCON Byrum
 
An overview of open source in East Asia (China, Japan, Korea)
OSCON Byrum
 
Oscon 2013 Jesse Anderson
OSCON Byrum
 
US Patriot Act OSCON2012 David Mertz
OSCON Byrum
 
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON Byrum
 
Big Data for each one of us
OSCON Byrum
 
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
OSCON Byrum
 
Declarative web data visualization using ClojureScript
OSCON Byrum
 
Using and Building Open Source in Google Corporate Engineering - Justin McWil...
OSCON Byrum
 
A Look at the Network: Searching for Truth in Distributed Applications
OSCON Byrum
 
Life After Sharding: Monitoring and Management of a Complex Data Cloud
OSCON Byrum
 
Faster! Faster! Accelerate your business with blazing prototypes
OSCON Byrum
 
Comparing open source private cloud platforms
OSCON Byrum
 
Ad

Recently uploaded (20)

PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 

Android Security Essentials