Introduction
So far we've covered most of the high-level aspects of applications on the Android platform; this chapter focuses on the some of the native aspects—everything supporting the application layer components. The native aspects include the system daemons, the binary executables—compiled specifically for the system architecture—and the components of the filesystem and device-level configurations. Any of these aspects of the Android system may cause security vulnerabilities and enable privilege escalation on Android devices—especially smartphones—and thus they cannot be looked over in a complete security review of an Android system.
This chapter also covers how to pick up some basic memory corruption exploitation flaws. However, please note that this chapter does not cover all of the known memory exploitation styles and techniques. But what is covered is enough to allow you to learn how to implement most of the others on your own. This chapter also includes good articles and sources...