万本电子书0元读

万本电子书0元读

顶部广告

Exploring SE for Android电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:William Confer

出  版  社:Packt Publishing

出版时间:2015-02-24

字       数:134.5万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is intended for developers and engineers with some familiarity of operating system concepts as implemented by Linux. A basic background in C code would be helpful. Their positions range from hobbyists wanting to secure their Android powered creations to OEM engineers building handsets to engineers of emerging areas where Android is seeing growth.
目录展开

Exploring SE for Android

Table of Contents

Exploring SE for Android

Credits

Foreword

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Linux Access Controls

Changing permission bits

Changing owners and groups

The case for more

Capabilities model

Android's use of DAC

Glancing at Android vulnerabilities

Skype vulnerability

GingerBreak

Rage against the cage

MotoChopper

Summary

2. Mandatory Access Controls and SELinux

Getting back to the basics

Labels

Users

Roles

Types

Access vectors

Multilevel security

Putting it together

Complexities and best practices

Summary

3. Android Is Weird

Android's security model

Binder

Binder's architecture

Binder and security

Zygote – application spawn

The property service

Summary

4. Installation on the UDOO

Retrieving the source

Flashing image on an SD card

UDOO serial and Android Debug Bridge

Flipping the switch

It's alive

Summary

5. Booting the System

Policy load

Fixing the policy version

Summary

6. Exploring SELinuxFS

Locating the filesystem

Interrogating the filesystem

The enforce node

The disable file interface

The policy file

The null file

The mls file

The status file

Access Vector Cache

The booleans directory

The class directory

The initial_contexts directory

The policy_capabilities directory

ProcFS

Java SELinux API

Summary

7. Utilizing Audit Logs

Upgrades – patches galore

The audit system

The auditd daemon

Auditd internals

Interpreting SELinux denial logs

Contexts

Summary

8. Applying Contexts to Files

Labeling filesystems

fs_use

fs_task_use

fs_use_trans

genfscon

Mount options

Labeling with extended attributes

The file_contexts file

Dynamic type transitions

Examples and tools

Fixing up /data

A side note on security

Summary

9. Adding Services to Domains

Init – the king of daemons

Dynamic domain transitions

Explicit contexts via seclabel

Relabeling processes

Limitations on app labeling

Summary

10. Placing Applications in Domains

The case to secure the zygote

Fortifying the zygote

Plumbing the zygote socket

The mac_permissions.xml file

keys.conf

seapp_contexts

Summary

11. Labeling Properties

Labeling via property_contexts

Permissions on properties

Relabeling existing properties

Creating and labeling new properties

Special properties

Control properties

Persistent properties

SELinux properties

Summary

12. Mastering the Tool Chain

Building subcomponents – targets and projects

Exploring sepolicy's Android.mk

Building sepolicy

Controlling the policy build

Digging deeper into build_policy

Building mac_permissions.xml

Building seapp_contexts

Building file_contexts

Building property_contexts

Current NSA research files

Standalone tools

sepolicy-check

sepolicy-analyze

Summary

13. Getting to Enforcing Mode

Updating to SEPolicy master

Purging the device

Setting up CTS

Running CTS

Gathering the results

CTS test results

Audit logs

Authoring device policy

adbd

bootanim

debuggerd

drmserver

dumpstate

installd

keystore

mediaserver

netd

rild

servicemanager

surfaceflinger

system_server

toolbox

untrusted_app

vold

watchdogd

wpa

Second policy pass

init

shell

init_shell.te

Field trials

Going enforcing

Summary

A. The Development Environment

VirtualBox

Ubuntu Linux 12.04 (precise pangolin)

VirtualBox extension pack and guest additions

VirtualBox extension pack

VirtualBox guest additions

Save time with shared folders

The build environment

Oracle Java 6

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部