AdvancedMobileAndroidOperating Systems

Android Security Internals

An In-Depth Guide to Android's Security Architecture

4 / 5

Nikolay Elenkov on the actual implementation of Android's security model: package manager internals, permissions, keystore, SELinux integration, verified boot.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2014
Publisher
No Starch Press
Pages
432
Language
English

Read this if

Mobile security researchers and Android pentesters who need to understand the platform at architecture depth. Elenkov covers the security framework, signing, permissions, keystore, and the encryption stack. The reference book on Android security architecture.

Skip this if

App-only pentesters who don't care about platform internals, or anyone wanting current (post-2014) Android specifics. Principles transfer, specifics don't.

Key takeaways

  • Android's security model is a layered system (Linux kernel + framework + signing) that breaks in non-obvious ways at the seams between layers; the book teaches you to see the seams.
  • The keystore and SELinux chapters are still the best treatment for understanding how device-level secrets and process boundaries actually work.
  • Signing and verified boot are the trust roots that subsequent app-layer security depends on; the book's chapters on them remain foundational.

Notes

Pair with the AOSP source and the Android Open Source Project security documentation for the current authoritative view. Elenkov's blog (nelenkov.blogspot.com) covered Android security continuously after the book; his later work at Google shows the same depth. For app-layer pentest, follow with the OWASP Mobile Application Security Testing Guide.