Lines Matching full:application

30   native code is constrained by the Application Sandbox.  Whether that code is
31 the result of included application behavior or a exploitation of an application
32 vulnerability, the system would prevent the rogue application from harming
59 <h3 id="the-application-sandbox">The Application Sandbox</h3>
61 means of identifying and isolating application resources. The Android system
62 assigns a unique user ID (UID) to each Android application and runs it as that user
66 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
70 limited access to the operating system. If application A tries to do something
71 malicious like read application B's data or dial the phone without permission
72 (which is a separate application), then the operating system protects against
73 this because application A does not have the appropriate user privileges. The
76 <p>Since the Application Sandbox is in the kernel, this security model extends to
78 kernel in <em>Figure 1</em>, including operating system libraries, application
79 framework, application runtime, and all applications run within the Application
82 On Android, there are no restrictions on how an application can be written that
89 the context of that particular application, with the permissions established by
91 <p>Like all security features, the Application Sandbox is not unbreakable.
92 However, to break out of the Application Sandbox in a properly configured
96 libraries, application runtime, application framework, and applications. This
102 alter or read another user's files. In the case of Android, each application
104 applications, files created by one application cannot be read or altered by
105 another application.</p>
123 application with root permissions from modifying the operating system, kernel,
124 and any other application. In general, root has full access to all
125 applications and all application data. Users that change the permissions on an
127 exposure to malicious applications and potential application flaws. </p>
140 <p> Encrypting data with a key stored on-device does not protect the application
144 present, but at some point the key must be provided to the application and it
179 built-in Android Email application uses the APIs to improve Exchange support.
180 Through the Email application, Exchange administrators can enforce password