Please log in to watch this conference skillscast.
Find out how to prevent hackers using root exploits against your Android app in this Droidcon London talk!
The need for root exploits to gain full control of Android systems gives attackers easy to use tools which can be included in malware – you could pack an existing exploit into an app in as few as three hours!
To harden Android devices for enterprise usage, zertisa is developing a multi-boot Android system based on Linux containers. By design, this abstraction layer does not offer more security – exploits that run in one container can easily infect the host system, and breaking out of the container is only a matter of mounting the right partition. So, how do you solve this problem?
To securely use such a system, Janosch Maier will propose the following:
Each container uses its own kernel to prevent the spreading of root-kits between containers
The containers use SEAndroid policies to complicate the use of root-exploits to break out
Each container is encrypted to complicate physical attacks
The use of SEAndroid promises the best increase of security. Though such measures are essential to prevent container break-outs, their use is not limited to dual boot solutions, and luckily are by now merged into the Android AOSP.
Find out how to apply these methods and fully protect your app - watch this video from Droidcon London now!
YOU MAY ALSO LIKE:
- DDD eXchange 2017 (in London on 27th - 28th April 2017)
- Building Evolutionary Architectures (in London on 16th May 2017)
- Greg Young's CQRS, Domain Events, Event Sourcing and how to apply DDD (in Stockholm on 22nd - 24th May 2017)
- Alberto Brandolini's DDD Modelling Workshop (in London on 26th - 28th June 2017)