Entries from 2014-09-03 to 1 day
4. KIRIN SECURITY RULESThe malware threats and the Android architecture introduced in the previous sections serve as the background for developing Kirin security rules to detect potentially dangerous application configurations. To ensure th…