133050-Thumbnail Image.png
Description

Despite the more tightly controlled permissions and Java framework used by most programs in the Android operating system, an attacker can use the same classic vulnerabilities that exist for traditional Linux binaries on the programs in the Android operating system.

Despite the more tightly controlled permissions and Java framework used by most programs in the Android operating system, an attacker can use the same classic vulnerabilities that exist for traditional Linux binaries on the programs in the Android operating system. Some classic vulnerabilities include stack overows, string formats, and heap meta-information corruption.

532.45 KB application/pdf

Download restricted. Please sign in.

Download count: 0

Details

Contributors
Date Created
2018-12
Resource Type
  • Text
  • Machine-readable links