From the course: Threat Modeling: Tampering in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Mobile

Mobile

From the course: Threat Modeling: Tampering in Depth

Start my 1-month free trial

Mobile

- [Instructor] Processes get very different protections on mobile phone operating systems. There processes are protected from one another. The design is that processes cannot tamper with each other. Android apps run as different UIDs. The birds can't peck at the zombies and the zombies can't eat the plants under the birds. More importantly, they can't change your high score, give you extra coins, or change the rest end point where your credit card gets sent and neither can anything else. Apple apps are sand boxed so that libraries can only be loaded if they come from either the same creator or the operating system. The operating system libraries are read only, what's more the application themselves are signed and both operating systems validate a signature before running a process. These designs were created in the 2000s and show many patterns that system designers should pay attention to. Sometimes developers want to…

Contents