Customize Android OS to secure information system

1, Understand the Android security mechanisms.

2, Leaf through Android security problems.

3, Propose a solution to customize the OS.

 

Steps:

1, What tool, environment needed to custom an OS.  [one week]

2, How to decide which component is needed for a specific system. [one week]

3, What kind of security features should be satisfied for a specific system. [one week]

 

Background:

1, Android System Architecture

2, unix-like OS booting process

3, root a device

4, Other terminologies: Zygote, Dalvik VM, Swap space, sandbox, register-based architecture VS stack-based architecture.

5, Dalvik VM and ART: see generic introduction on https://source.android.com/devices/tech/dalvik/#features

 

 

Reference:

1, <5*> S. Liebergeld, and M. Lange. Android Security, Pitfalls, Lessons learned and BYOD

2, <5*> http://davidehringer.com/software/android/The_Dalvik_Virtual_Machine.pdf

One thought on “Customize Android OS to secure information system

Leave a comment