国产 无码 综合区,色欲AV无码国产永久播放,无码天堂亚洲国产AV,国产日韩欧美女同一区二区

【Android】Mobile-Security-Framework-MobSF Manifest 靜態(tài)掃描規(guī)則

這篇具有很好參考價(jià)值的文章主要介紹了【Android】Mobile-Security-Framework-MobSF Manifest 靜態(tài)掃描規(guī)則。希望對(duì)大家有所幫助。如果存在錯(cuò)誤或未考慮完全的地方,請(qǐng)大家不吝賜教,您也可以點(diǎn)擊"舉報(bào)違法"按鈕提交疑問(wèn)。

前言

移動(dòng)安全框架(MobSF)是一個(gè)自動(dòng)化的一體化移動(dòng)應(yīng)用程序(Android/iOS/Windows)測(cè)試、惡意軟件分析和安全評(píng)估框架,能夠執(zhí)行靜態(tài)和動(dòng)態(tài)分析。MobSF支持移動(dòng)應(yīng)用程序二進(jìn)制文件(APK、XAPK、IPA和APPX)以及壓縮源代碼,并提供REST API,可與您的CI/CD或DevSecOps管道無(wú)縫集成。動(dòng)態(tài)分析器可幫助您執(zhí)行運(yùn)行時(shí)安全評(píng)估和交互式儀器測(cè)試。

通過(guò)分析源碼中對(duì)manifest的檢測(cè)規(guī)則,來(lái)學(xué)習(xí)其可能存在的安全風(fēng)險(xiǎn)。

正文

源碼位置views/android/manifest_analysis.py的manifest_analysis函數(shù)

【Android】Mobile-Security-Framework-MobSF Manifest 靜態(tài)掃描規(guī)則,Android_JAVA層_安全,android,漏洞,mobsf,manifest,靜態(tài)掃描,客戶端

?high*6

規(guī)則名 條件 級(jí)別 描述
a_clear_text android:usesCleartextTraffic=true high The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
a_debuggable android:debuggable=true high Debugging was enabled on the app which makes it easier for reverse engineers to hook a debugger to it. This allows dumping a stack trace and accessing debugging helper classes.
a_testonly android:testOnly=true high It may expose functionality or data outside of itself that would cause a security hole.
a_launchmode android:launchMode = singleInstance or singleTask high An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
a_not_protected android:exported=true high A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
a_improper_provider android:pathPrefix == / high A content provider permission was set to allows access from any other app on the device. Content providers may contain sensitive information about an app and therefore should not be shared.

warning*28

規(guī)則名 條件 級(jí)別 描述
a_allowbackup Application Data can be Backed up [android:allowBackup=true] warning This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
a_allowbackup_miss Application Data can be Backed up [android:allowBackup] flag is missing. warning The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
a_taskaffinity TaskAffinity is set for Activity warning If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
a_prot_normal is Protected by a permission, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission. However, the protection level of the??permission is set to normal. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
a_prot_danger is Protected by a permission, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission. However, the protection level of the permission is set to dangerous. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
a_prot_unknown is Protected by a permission, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
a_prot_normal_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.??It is protected by a permission at the application level. However, the protection level of the permission is set to normal. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
a_prot_danger_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission at the application level. However, the protection level of the permission is set to dangerous. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
a_prot_unknown_appl is Protected by a permission at the application, but the protection level of the permission should be checked.[android:exported=true] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission at the application level which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
a_not_protected_filter is not Protected.An intent-filter exists. warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the %s is explicitly exported.
c_not_protected is not Protected.[[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is a Content Provider that targets an API level under 17, which makes it exported by default, regardless of the API level of the system that the application runs on.
c_not_protected2 would not be Protected if the application ran on a device where the the API level was less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider(%s %s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would be shared with other apps on the device therefore leaving it accessible to any other application on the device.
c_prot_normal is Protected by a permission, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission. However, the protection level of the permission is set to normal. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_danger is Protected by a permission, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission. However, the protection level of the permission is set to dangerous. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_unknown is Protected by a permission, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
c_prot_normal_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission at the application level. However, the protection level of the permission is set to normal. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_danger_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission at the application level. However, the protection level of the permission is set to dangerous. This means that a malicious application can request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_unknown_appl is Protected by a permission at application level, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] warning A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission at application level which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
c_prot_normal_new is Protected by a permission, but the protection level of the permission should be checked if the application runs on a device where the the API level is less than 17 [Content Provider, targetSdkVersion >= 17] warning The Content Provider (%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to normal. This means that a malicious application could request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_danger_new is Protected by a permission, but the protection level of the permission should be checked if the application runs on a device where the the API level is less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to dangerous. This means that a malicious application could request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_unknown_new is Protected by a permission, but the protection level of the permission should be checked??if the application runs on a device where the the API level is less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
c_prot_normal_new_appl is Protected by a permission at the application level should be checked, but the protection level of the permission if the application runs on a device where the the API level is less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider (%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to normal. This means that a malicious application could request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_danger_new_appl is Protected by a permission at the application level, but the protection level of the permission should be checked if the application runs on a device where the the API level is less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to dangerous. This means that a malicious application could request and obtain the permission and interact with the component. If it was set to signature, only applications signed with the same certificate could obtain the permission.
c_prot_unknown_new_appl is Protected by a permission at the application level, but the protection level of the permission should be checked??if the application runs on a device where the the API level is less than 17.[Content Provider, targetSdkVersion >= 17] warning The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. In that situation, it would still be protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
a_dailer_code Dailer Code: Found <br>[android:scheme="android_secret_code"] warning A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
a_sms_receiver_port Data SMS Receiver Set on Port: Found<br>[android:port] warning A binary SMS receiver is configured to listen on a port. Binary SMS messages sent to a device are processed by the application in whichever way the developer choses. The data in this SMS should be properly validated by the application. Furthermore, the application should assume that the SMS being received is from an untrusted source.
a_high_intent_priority High Intent Priority [android:priority] warning By setting an intent priority higher than another intent, the app effectively overrides other requests.
a_high_action_priority High Action Priority [android:priority] warning By setting an action priority higher than another action, the app effectively overrides other requests.

info*14

規(guī)則名 條件 級(jí)別 描述
a_boot_aware App is direct-boot aware [android:directBootAware=true] info This app can run before the user unlocks the device. If you're using a custom subclass of Application, and if any component inside your application is direct - boot aware, then your entire custom application is considered to be direct - boot aware.During Direct Boot, your application can only access the data that is stored in device protected storage.
a_network_sec App has a Network Security Configuration [android:networkSecurityConfig] info The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.?
a_prot_sign is Protected by a permission.[android:exported=true] info A%s %s is found to be exported, but is protected by permission.
a_prot_sign_sys is Protected by a permission, but the protection level of the permission should be checked.[android:exported=true] info A%s %s is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
a_prot_sign_appl Protected by a permission at the application level.[android:exported=true] info A%s %s is found to be exported, but is protected by a permission at the application level.
a_prot_sign_sys_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[android:exported=true] info A%s %s is found to be exported, but is protected by a permission at the application level. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
c_prot_sign is Protected by a permission.[Content Provider, targetSdkVersion < 17] info A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by permission.
c_prot_sign_sys is Protected by a permission, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] info A%s %s is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
c_prot_sign_appl is Protected by a permission at the application level.[Content Provider, targetSdkVersion < 17] info A%s %s is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by permission at the application level.
c_prot_sign_sys_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion < 17] info A%s %s is found to be exported, but is protected by a permission at the application level. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
c_prot_sign_new is Protected by a permission.[Content Provider, targetSdkVersion >= 17] info The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. Nevertheless, it is protected by a permission.
c_prot_sign_sys_new is Protected by a permission, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion >= 17] info The Content Provider(%s) would be exported if the application ran on a device where the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
c_prot_sign_new_appl is Protected by a permission at the application level.[Content Provider, targetSdkVersion >= 17] info The Content Provider(%s) would be exported if the application ran on a device where the the API level was less than 17. Nevertheless, it is protected by a permission.
c_prot_sign_sys_new_appl is Protected by a permission at the application level, but the protection level of the permission should be checked.[Content Provider, targetSdkVersion >= 17] info The Content Provider(%s) would be exported if the application ran on a device where the API level was less than 17. In that situation, it would still be protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.

后話

上述的48個(gè)manifest的風(fēng)險(xiǎn)項(xiàng)應(yīng)該是比較全的了,可以當(dāng)做學(xué)習(xí)資料和風(fēng)險(xiǎn)checklist進(jìn)行查詢。文章來(lái)源地址http://www.zghlxwxcb.cn/news/detail-662147.html

到了這里,關(guān)于【Android】Mobile-Security-Framework-MobSF Manifest 靜態(tài)掃描規(guī)則的文章就介紹完了。如果您還想了解更多內(nèi)容,請(qǐng)?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!

本文來(lái)自互聯(lián)網(wǎng)用戶投稿,該文觀點(diǎn)僅代表作者本人,不代表本站立場(chǎng)。本站僅提供信息存儲(chǔ)空間服務(wù),不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任。如若轉(zhuǎn)載,請(qǐng)注明出處: 如若內(nèi)容造成侵權(quán)/違法違規(guī)/事實(shí)不符,請(qǐng)點(diǎn)擊違法舉報(bào)進(jìn)行投訴反饋,一經(jīng)查實(shí),立即刪除!

領(lǐng)支付寶紅包贊助服務(wù)器費(fèi)用

相關(guān)文章

  • Android Framework 之 SystemServer

    SystemServer是Android系統(tǒng)中的一個(gè)核心組件,負(fù)責(zé)啟動(dòng)和管理許多重要的系統(tǒng)服務(wù)。它的啟動(dòng)過(guò)程相對(duì)復(fù)雜,包含以下主要步驟: Zygote啟動(dòng)SystemServer :在Android系統(tǒng)啟動(dòng)過(guò)程中,Zygote進(jìn)程會(huì)通過(guò)fork操作創(chuàng)建一個(gè)新的進(jìn)程,并在這個(gè)新的進(jìn)程中啟動(dòng)SystemServer。 加載并執(zhí)行SystemSer

    2024年02月14日
    瀏覽(21)
  • Android Framework 之 Zygote

    Android Zygote 是 Android 操作系統(tǒng)中一個(gè)關(guān)鍵的系統(tǒng)服務(wù),它在系統(tǒng)啟動(dòng)時(shí)加載,為應(yīng)用程序的運(yùn)行提供了一種快速且資源高效的方式。 Zygote 的主要作用如下: 預(yù)加載共享庫(kù)和類 :Zygote 啟動(dòng)時(shí),會(huì)預(yù)先加載 Android 系統(tǒng)中所有應(yīng)用程序共享的庫(kù)和類,例如 Android Runtime,標(biāo)準(zhǔn) Ja

    2024年02月14日
    瀏覽(16)
  • Android Framework基礎(chǔ)面試篇~

    Android Framework基礎(chǔ)面試篇~

    在Android應(yīng)用開(kāi)發(fā)面試中,針對(duì)Framework的問(wèn)題是常被考察的。以下是一些常見(jiàn)的Framework金典面試題目及其詳解: 1. 什么是Android應(yīng)用生命周期?你能描述一下它包含哪幾個(gè)階段嗎? Android應(yīng)用生命周期指的是應(yīng)用從啟動(dòng)到關(guān)閉的整個(gè)過(guò)程。 它包括以下四個(gè)階段: onCreate(創(chuàng)建)

    2024年02月10日
    瀏覽(20)
  • Android Framework 之 ServiceManager

    ServiceManager 在 Android 系統(tǒng)中扮演了核心的角色。主要負(fù)責(zé)跨進(jìn)程通信(IPC)的管理和服務(wù)的注冊(cè)與查找。 管理系統(tǒng)服務(wù) : ServiceManager 提供一個(gè)全局的服務(wù)注冊(cè)表,用于存儲(chǔ)所有的系統(tǒng)服務(wù)。一個(gè)服務(wù)一旦被注冊(cè)到 ServiceManager,其他的進(jìn)程就可以通過(guò) **ServiceManager **來(lái)訪問(wèn)這

    2024年02月14日
    瀏覽(19)
  • 【Android Framework (八) 】- Service

    【Android Framework (八) 】- Service

    1,掛載文件系統(tǒng),創(chuàng)建文件目錄 調(diào)用selinux_setup權(quán)限安全相關(guān) 2,初始化內(nèi)存空間 初始化屬性服務(wù) 創(chuàng)建Epoll 注冊(cè)監(jiān)聽(tīng)子進(jìn)程重啟異常操作等,對(duì)子進(jìn)程進(jìn)行線程守護(hù) 3,startPropertyServic 開(kāi)啟屬性服務(wù) 進(jìn)行監(jiān)聽(tīng) 4,LoadBootScripts 加載init.rc文件 進(jìn)行解析 調(diào)用do_class_start 文件開(kāi)啟

    2024年02月01日
    瀏覽(47)
  • 【移動(dòng)安全】MobSF聯(lián)動(dòng)安卓模擬器配置動(dòng)態(tài)分析教程

    【移動(dòng)安全】MobSF聯(lián)動(dòng)安卓模擬器配置動(dòng)態(tài)分析教程

    MobSF聯(lián)動(dòng)安卓模擬器配置動(dòng)態(tài)分析教程 Windows開(kāi)啟安卓模擬器并進(jìn)行相關(guān)配置作為調(diào)試客戶端,Linux使用docker開(kāi)啟MobSF作為服務(wù)端。 好處:干凈,部署簡(jiǎn)單,不用安裝亂七八糟的環(huán)境,防止破壞其他應(yīng)用的運(yùn)行環(huán)境! 安卓模擬器:雷電模擬器 虛擬機(jī)工具:VMware Workstation MobSF

    2024年04月15日
    瀏覽(43)
  • 【Android】Android Framework系列---CarPower深度睡眠STR

    【Android】Android Framework系列---CarPower深度睡眠STR

    之前博客說(shuō)了CarPower的開(kāi)機(jī)啟動(dòng)流程 這里分析一下,Android CarPower實(shí)現(xiàn)深度睡眠的流程。 首先, 什么是深度睡眠(Deep Sleep) ? Android進(jìn)入Deep Sleep后, 關(guān)閉屏幕、關(guān)閉CPU的電源,保持RAM的電源(激活狀態(tài)) 。深度睡眠會(huì)進(jìn)行 Suspend-to-RAM 掛起到內(nèi)存( 做車載的經(jīng)常會(huì)聽(tīng)到的STR )。

    2024年02月05日
    瀏覽(23)
  • Android Framework工具——EA畫圖

    Android Framework工具——EA畫圖

    ????????EA 是一個(gè)著名的企業(yè)架構(gòu)(Enterprise Architecture)工具,用于繪制和管理企業(yè)的架構(gòu)圖和過(guò)程模型。該工具提供了多種功能,包括建立業(yè)務(wù)流程圖、數(shù)據(jù)流圖、組織結(jié)構(gòu)圖、應(yīng)用架構(gòu)圖等。EA工具可幫助企業(yè)進(jìn)行戰(zhàn)略規(guī)劃、業(yè)務(wù)流程改進(jìn)和系統(tǒng)開(kāi)發(fā)等活動(dòng)。 新建項(xiàng)目

    2024年02月13日
    瀏覽(20)
  • Android Framework 全局替換系統(tǒng)字體

    Android Framework 全局替換系統(tǒng)字體

    基于Android 11 Android Framework 全局替換系統(tǒng)字體 將需要替換的字體資源放置frameworks/base/data/fonts/目錄下。 將系統(tǒng)默認(rèn)的Roboto字體替換為HarmonyOs字體。 frameworks/base/data/fonts/fonts.xml frameworks/base/data/fonts/Android.mk frameworks/base/data/fonts/fonts.mk 編譯刷機(jī)驗(yàn)證。 frameworks/base/graphics/java/and

    2024年02月12日
    瀏覽(18)
  • Android Framework——Binder 監(jiān)控方案

    Android Framework——Binder 監(jiān)控方案

    作者:低性能JsonCodec 在 Android 應(yīng)用開(kāi)發(fā)中,Binder 可以說(shuō)是使用最為普遍的 IPC 機(jī)制了。我們考慮監(jiān)控 Binder 這一 IPC 機(jī)制,一般是出于以下兩個(gè)目的: 卡頓優(yōu)化:IPC 流程完整鏈路較長(zhǎng),且依賴于其他進(jìn)程,耗時(shí)不可控,而 Binder 調(diào)用本身通常又是以 RPC 形式對(duì)外提供能力的,

    2024年02月04日
    瀏覽(20)

覺(jué)得文章有用就打賞一下文章作者

支付寶掃一掃打賞

博客贊助

微信掃一掃打賞

請(qǐng)作者喝杯咖啡吧~博客贊助

支付寶掃一掃領(lǐng)取紅包,優(yōu)惠每天領(lǐng)

二維碼1

領(lǐng)取紅包

二維碼2

領(lǐng)紅包