On 6/17/2011 3:41 PM, Chris Palmer wrote:

The Android kernel binder driver just exposes /dev/binder interface that is
readable and writable by all apps -- everything can talk to everything.
Yes, but as on the internet, the message recipient can decide whether
or not it wants to act on the request. In the case of Android, the
kernel allows a Binder message recipient to learn the UID and GID of
the caller; the recipient can then invoke the Android framework to
determine if the caller is authorized to make the call. For example:


Also, as on the Internet, it's up to the individual apps to protect themselves, rather than the infrastructure providing systemic safeguards. Apps are responsible for inbound filtering of IPC (much like firewalls protecting individual hosts/networks). While that is important, an complementary approach would be for the framework to perform outbound filtering of IPC.

I have an app on my Android device (ES File Explorer) that appears to have unfettered access to the entire filesystem. What protection does the OS itself have against system calls?

--
You received this message because you are subscribed to the Google Groups "Android 
Security Discussions" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to