Understanding Android-II (Kernel & HAL)

  1. A user-based permissions model
  2. Process isolation
  3. An extensible mechanism for secure IPC
  4. The ability to remove unnecessary and potentially insecure parts of the kernel
  1. Prevents user A from reading user B’s files
  2. Ensures that user A does not exhaust user B’s memory
  3. Ensures that user A does not exhaust user B’s CPU resources
  4. Ensures that user A does not exhaust user B’s devices (for example, telephony, GPS, and Bluetooth)

--

--

--

A computer enthusiast and a tech geek, looking towards the future as to become an intellect in Cyber Security and to excel in the industry with great passion.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Android(Java, Kotlin) — Course Plan

Periodic Tasks with Android WorkManager

Kotlin Flow [All official development resources]

SplashActivity in Android Studio

One Tap sign in for Android apps

Hero banner decoration

Forms and its validation in Flutter

Swipe Refresh Layout In Android

How to write and to read files from Kotlin in JetPack Compose

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aasish Mithra

Aasish Mithra

A computer enthusiast and a tech geek, looking towards the future as to become an intellect in Cyber Security and to excel in the industry with great passion.

More from Medium

Building your own Termux with a custom package name

Behavioral Cryptography

Building ghostgame.io — A multiplayer word game

Back-end system design

Export all API names from APIGEE Cloud