The Fundamental Android Security Models

The underlying security architecture that builds a strong and secure Operating System as Android is now.

Lam Pham
moduloTech

--

A secure Android phone
Photo by Dan Nelson on Unsplash

Security is always one of the most essential criterions that has been focused on in Android OS from its ground up until the latest updated versions. In this article, we will discover a couple of models that define how Android behaves.

Before diving into the detail, it is worth noting that Android platform makes use of Linux, so its features are often based on the principles of Linux.

1. Application Sandbox

The foundation of the Android application security model is that no two applications running on the same device should be able to access each other’s data without authorization.

They should not affect the operation of other applications, either. These are the concepts of an Application Sandbox. It takes advantages of Linux user-based protection to isolate resources for each application and assign a unique user identifier (UID). That means each application will be running under its own user and its own virtual machine (VM), Dalvik or ART, so each process executes independently from one another. However, do not mistake the above concept with a virtual machine (in term of virtualization)

--

--