Lines Matching full:application
58 application code using the Android SDK and correct any identified issues.</li>
90 <p>Application signatures play an important role in device security and are used
92 for signing applications, it is important to consider whether an application
103 keys. This often occurs when creating an application for different devices,
104 especially when using the platform key. If the application is
105 device-independent, use the same key across devices. If the application is
113 your application has a unique package name. Best practices:</p>
121 <li>Create an application package name that is clearly associated with your
163 application with low or no privileges to handle network traffic.</li>
185 <p>The Android Application Sandbox provides applications with an expectation of
187 debuggers. Unless debugging is specifically enabled by the application and the
188 user, no application should violate that expectation. Best practices:</p>
191 <li>Root processes must not access data within individual application data
195 <li>Devices must not include any application that accesses data or memory of
236 application processor) use network sockets to communicate between processors.
265 application to rename trusted files, substitute files, or conduct symlink-based
268 uninstall of an application from properly cleaning up all files associated with
269 an application.</p>