I am actually studying mobile security and I am focusing on hardware protection, so, I wonder, if is it possible an app can access to mobile hardware resources, and dominate on them, so, no access to any hardware resource by other apps only if permission was given by the dominating app? (as a second level of hardware security).
Related Questions in ANDROID
- Creating global Class holder
- Flutter + Dart: Editing name of a tab shows up a black screen
- android-pdf-viewer Received status code 401 from server: Unauthorized
- Sdk 34 WRITE_EXTERNAL_STORAGE not working
- ussd reader in Recket Native module
- Incorrect display of LinearGradientBrush in IOS
- The Binary Version Of its metadata is 1.8.0, expected Version is 1.6.0 build error
- I can't make TextInput to auto expand properly in Android
- Creating multiple instances of a class with different initializing values in Flutter
- How to create a lottie animation
- making android analyze with coverity sast tool
- Flutter plugin development android src not opening after opening example
- I initialize my ViewModel in the Activity with several fragments as tabs, but the fragments(tabs) return null for the updated livedata
- Node.js Server + Socket.IO + Android Mobile Applicatoin XHR Polling Error...?
- How I can use the shared preferences class?
Related Questions in ANDROID-HARDWARE
- Android kernel BUG at drivers/gpu/msm/adreno_dispatch.c
- Android Unblock device Microphone
- Android HAL for communicating between different partitions
- Using Hardware acceleration in different fragments
- RK3588 MIPI Panel Debugging: RK3588-MIPI-DSI LCD Power up Initialization Sequence
- How to debug the Sony imx415 camera connect with rk3588
- WearOs Physical Home click event detect programmatically in JetPack Compose
- Android JAVA QUESTION How do I turn on both the Camera and the Phone Flashlight?
- While pressing HARDWARE button
- Why I cant get the Device name even the device have Device name in android?
- My Phone is not detected only by my laptop but other
- How to create a Bluetooth scanner in Android Studios and retrieving the scanned devices' hardware information
- Detect "Windows" key of qwerty keyboard in Android
- Android- Kotlin: how can i measure and detect covered area by a finger touch on screen
- Where can I specify the physical dimensions (width, height, depth) of a custom Android emulator in Android Studio?
Related Questions in DATA-PROTECTION
- Well isolated DB storage for each user
- How to Restrict access to company's sensitive information for a developer from other country?
- How do I migrate .NET Core data protection keys from Redis to MySQL entity framework?
- Unable to Utilize Full Microsoft BI Functionality with Local Data due to Privacy Concerns
- protect and unprotect a checkbox with a warning give me a erroneous behaviour
- Data protection still works after deleting all keys from the database
- Should I configure ASP.NET Data Protection when using Docker with Azure Container App
- AddDataProtection - Register PersistKeysToFileSystem and PersistKeysToDbContext at the same time
- Is it secure to use GCP signed URLs on a public site for uploading sensitive identification documents?
- Protect application that uses time from a website as license key
- How do I use Core WCF in Kubernetes?
- Discord python bot: Is data sent through slash commands secure/protected?
- Using Asp.Net Core Data Protection in scalable Azure App service
- Seeking Advice on Enhancing Security Measures for My React Native Money Game
- Is it possible to change the protection level of folders and files while app is in background and device is locked?
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
At least for camera, I'm aware of using Android Device Administration with a policy to
Disable camera: https://developer.android.com/guide/topics/admin/device-admin.html Typically using a Mobile Device Manager would be used on authorized devices by corporations/governments in sensitive locations. Other restrictions are probably available as the Device Manager software would be accessing Device Manufacturer APIs.Another method to achieve your goal of 'wrapping' the hardware is to not let the Android app actually talk to Android framework methods. Basically the client app would be running a virtual container with the container mocking Android framework APIs.
See: How to execute APKs on a customized data directory?
And Commonsware's blog post for additional details: https://commonsware.com/blog/2017/01/17/droidception.html
This would allow you to add additional restrictions at the cost of having all of the apps go through the virtual container. Enforcing the user to always use the container isn't really possible unless you are building a custom ROM or perhaps rooted.
And if you are doing a custom ROM or rooted you might as well add any additional hardware restrictions through those methods.