This unfortunately makes Android much less trustworthy as its security model is essentially permission-based at install time ONLY. However, during the past year, researchers have demonstrated that they could "borrow" permission from other programs even if their programs did not initially ask for them. In addition, AFAIK each program is controlled in its own sandbox so that it does not affect other programs. AFAIK, one might need to work on the low level linux to do this job or use theorem provers to anlayze programs without having to understanding the underlying programs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |