On Monday, June 20, 2011 12:39:17 AM UTC-4, Chris Palmer wrote: > > Thought experiment: pick any recent Android malware, and explain how > standard security mechanisms could not have stopped it and how SELinux > could have. >
Check out the presentation done here: http://selinuxproject.org/~jmorris/lss2011_slides/caseforseandroid.pdf Slides 19 through 45 basically illustrate the "spirit" of your thought experiment put down on paper - specific examples of how SELinux could have intervened in specific Android vulnerabilties -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To view this discussion on the web visit https://groups.google.com/d/msg/android-security-discuss/-/rHayZfpZ61AJ. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.