Understanding Android-II (Kernel & HAL)

  1. A user-based permissions model
  2. Process isolation
  3. An extensible mechanism for secure IPC
  4. The ability to remove unnecessary and potentially insecure parts of the kernel
  1. Prevents user A from reading user B’s files
  2. Ensures that user A does not exhaust user B’s memory
  3. Ensures that user A does not exhaust user B’s CPU resources
  4. Ensures that user A does not exhaust user B’s devices (for example, telephony, GPS, and Bluetooth)

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aasish Mithra

Aasish Mithra

6 Followers

A computer enthusiast and a tech geek, looking towards the future as to become an intellect in Cyber Security and to excel in the industry with great passion.