1, Understand the Android security mechanisms.
2, Leaf through Android security problems.
3, Propose a solution to customize the OS.
Steps:
1, What tool, environment needed to custom an OS. [one week]
2, How to decide which component is needed for a specific system. [one week]
3, What kind of security features should be satisfied for a specific system. [one week]
Background:
1, Android System Architecture
2, unix-like OS booting process
3, root a device
4, Other terminologies: Zygote, Dalvik VM, Swap space, sandbox, register-based architecture VS stack-based architecture.
5, Dalvik VM and ART: see generic introduction on https://source.android.com/devices/tech/dalvik/#features
Reference:
1, <5*> S. Liebergeld, and M. Lange. Android Security, Pitfalls, Lessons learned and BYOD
2, <5*> http://davidehringer.com/software/android/The_Dalvik_Virtual_Machine.pdf
Keep update the blog and add more info
LikeLike