Nytro Posted July 29, 2014 Report Posted July 29, 2014 Android ApplicationSecure Design/Secure Coding Guidebook1. Introduction ................................................................................................................................ 91.1. Building a Secure Smartphone Society ................................................................................... 91.2. Timely Feedback on a Regular Basis Through the Beta Version ............................................. 101.3. Usage Agreement of the Guidebook .................................................................................... 112. Composition of the Guidebook .................................................................................................. 122.1. Developer's Context ............................................................................................................ 122.2. Sample Code, Rule Book, Advanced Topics .......................................................................... 132.3. The Scope of the Guidebook ............................................................................................... 162.4. Literature on Android Secure Coding ................................................................................... 172.5. Steps to Install Sample Codes into Eclipse ........................................................................... 183. Basic Knowledge of Secure Design and Secure Coding ............................................................... 343.1. Android Application Security ............................................................................................... 343.2. Handling Input Data Carefully and Securely ......................................................................... 474. Using Technology in a Safe Way ................................................................................................. 494.1. Creating/Using Activities .................................................................................................... 494.2. Receiving/Sending Broadcasts ............................................................................................. 934.3. Creating/Using Content Providers ..................................................................................... 1264.4. Creating/Using Services .................................................................................................... 1754.5. Using SQLite ..................................................................................................................... 2194.6. Handling Files ................................................................................................................... 2374.7. Using Browsable Intent ...................................................................................................... 2644.8. Outputting Log to LogCat .................................................................................................. 2684.9. Using WebView ................................................................................................................. 2805. How to use Security Functions ................................................................................................. 2915.1. Creating Password Input Screens ....................................................................................... 2915.2. Permission and Protection Level ........................................................................................ 3065.3. Add In-house Accounts to Account Manager ..................................................................... 3345.4. Communicating via HTTPS ................................................................................................ 3536. Difficult Problems ................................................................................................................... 3756.1. Risk of Information Leakage from Clipboard ...................................................................... 375Download: http://www.jssec.org/dl/android_securecoding_en.pdf Quote