Android Security Architecture

  • Sheran Gunasekera


In Chapter 2, we looked at a simple example of how we can protect information using encryption. However, that example did not make use of Android’s built-in security and permissions architecture. In this chapter, we will take a look at what Android is able to offer the developer and end user with regard to security. We will also look at some direct attacks that can take place on applications and how to take the necessary safeguards to minimize the loss of private data.


Virtual Machine Content Provider Custom Permission Virtual Machine Instance Android Operating System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Sheran Gunasekera 2012

Authors and Affiliations

  • Sheran Gunasekera

There are no affiliations available

Personalised recommendations