Mobile Security
Application Permission Models
User Privilege Levels
Administrative Access Controls
Bootloader Security
Chain of Trust Establishment
Root of Trust Implementation
Boot Image Verification
Process Isolation Mechanisms
Inter-Process Communication Controls
Privilege Escalation Prevention
Resource Access Limitations
Digital Signature Implementation
Certificate Authority Trust
App Store Verification Process
Runtime Integrity Checks
Permission Request Mechanisms
User Consent Frameworks
Permission Granularity
Permission Revocation
Dynamic Permission Management
Device-Level Encryption
Application-Level Encryption
Key Management Systems
Secure Storage Implementation
Previous
1. Introduction to Mobile Security
Go to top
Next
3. Mobile Operating System Security Architectures