TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Android Reverse Engineering

67 点作者 r11t超过 14 年前

6 条评论

follower超过 14 年前
Always enjoy reading articles like this that describe the process of reverse engineering a particular technology or device.<p>Also appreciated the mention of the rageagainstthecage exploit which looks like it could be used to enable a "full user data" backup to be made of a device. One of my complaints about Android is that even the "owner" of the device (without rooting &#38; therefore warranty voiding) can't access all their own data files if an application provides no way of doing so.
joe_the_user超过 14 年前
Serious question: is there any application that could possibly resist revealing it's information if it's working ram is written to memory?
评论 #2061546 未加载
kurtsiegfried超过 14 年前
The main issue I have with this article is that it describes a very implausible circumstance in my opinion. If you have an application with such sensitive information on the phone to warrant this kind of testing, why would you not take advantage of the device administration policies to enforce a password policy and a password timeout policy?<p><a href="http://developer.android.com/reference/android/app/admin/DevicePolicyManager.html" rel="nofollow">http://developer.android.com/reference/android/app/admin/Dev...</a><p>There doesn't seem to be a policy in the current API docs to prevent a user from enabling USB debugging, but there is a rather large warning when that option is selected.<p>Without USB debugging and using a password policy, the author's strategy would not have worked. With the current strategy, this has nothing to do with Android, and everything to do with having poorly designed and poorly implemented security on the part of the application author.
评论 #2061835 未加载
trotsky超过 14 年前
Very interesting and in depth article, thank you very much for posting it.<p>Does anyone know why android chose not to use LSM or other kernel based capability enforcement? It would seem like such a hands off platform would be ideal for fine grained enforcement - allowing some amount of security to be maintained even in light of a privilege escalation exploit.
Bud超过 14 年前
Very detailed and entertaining to read.
jorgem超过 14 年前
Cool article. "Someone" should hire you :)