On Monday, June 20, 2011 12:39:17 AM UTC-4, Chris Palmer wrote:
>
> Thought experiment: pick any recent Android malware, and explain how
> standard security mechanisms could not have stopped it and how SELinux
> could have.
>

Check out the presentation done here: 
http://selinuxproject.org/~jmorris/lss2011_slides/caseforseandroid.pdf

Slides 19 through 45 basically illustrate the "spirit" of your thought 
experiment put down on paper - specific examples of how SELinux could have 
intervened in specific Android vulnerabilties

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/android-security-discuss/-/rHayZfpZ61AJ.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to