Skip to content
AOSP Insight
  • Home
  • Book
  • About Author
  • Contact me
  • Toggle website search
Menu Close
  • Home
  • Book
  • About Author
  • Contact me
  • Toggle website search

AOSP

  1. Home>
  2. Blog>
  3. AOSP
Read more about the article What Android Automotive Can Learn from the Pegasus Mechanism

What Android Automotive Can Learn from the Pegasus Mechanism

  • Post author:Mohammad Hossein Heydarchi
  • Post published:October 23, 2025
  • Post category:AOSP/Automotive/Security & Privacy
  • Post comments:0 Comments

In 2016, Citizen Lab received a request forwarded by Ahmed Mansoor, an Emirati human rights defender. It was a request to analyse a suspicious message. The message contained a malicious…

Continue ReadingWhat Android Automotive Can Learn from the Pegasus Mechanism
Read more about the article What It Takes to Build a Secure Android App

What It Takes to Build a Secure Android App

  • Post author:Mohammad Hossein Heydarchi
  • Post published:April 30, 2025
  • Post category:Security & Privacy/Software Design/Uncategorized
  • Post comments:0 Comments

When it comes to building secure applications, there’s no single magic formula. But if we step back and look at what really matters, we can group the essentials into three…

Continue ReadingWhat It Takes to Build a Secure Android App
Read more about the article Static and Dynamic Analysis Tools

Static and Dynamic Analysis Tools

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 21, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

What is static and dynamic code analysis? During the last years software has become larger and more complicated with many functionalities. These functionalities demand a bigger architecture and more complexity…

Continue ReadingStatic and Dynamic Analysis Tools
Read more about the article ProGuard and Obfuscation

ProGuard and Obfuscation

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 15, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

As the number of Android-based mobiles has been increased, the threats and malware targeting Android more than before. It means that we need to employ more techniques to protect the…

Continue ReadingProGuard and Obfuscation
Read more about the article GCC Security Features

GCC Security Features

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 14, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

In generating an executable from the code we can use the maximum potential to make the application safer by understanding and enabling the security and protection features. These features could…

Continue ReadingGCC Security Features
Read more about the article Secure development: Sanitizing user inputs

Secure development: Sanitizing user inputs

  • Post author:Mohammad Hossein Heydarchi
  • Post published:March 20, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

Input Sanitization, as the name implies, is a crucial component of secure coding methods. It entails cleaning and validating user input data, particularly when the program uses it in crucial…

Continue ReadingSecure development: Sanitizing user inputs
Read more about the article Secure development: Encoding Methods

Secure development: Encoding Methods

  • Post author:Mohammad Hossein Heydarchi
  • Post published:March 7, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

To ensure proper data handling and the avoidance of data injection attacks, output encoding is an essential approach in secure coding. To assure accurate interpretation and usage by various programming languages,…

Continue ReadingSecure development: Encoding Methods
Read more about the article Secure Development: Input Validation

Secure Development: Input Validation

  • Post author:Mohammad Hossein Heydarchi
  • Post published:March 5, 2024
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

A key approach in safe programming is input validation, which entails confirming that user input data is reliable, accurate, and satisfies the application's specifications. Making sure that the program does…

Continue ReadingSecure Development: Input Validation
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Categories


  • AOSP
  • Automotive
  • Battery
  • Build System
  • Core & System
  • Downloads
  • Framework
  • HAL Layer
  • Jetpack
  • Performance
  • Principles & Methodologies
  • Protocol
  • Security & Privacy
  • Software Design
  • Uncategorized

  • About Author
  • Privacy Policy
  • Contact me
  • Blog Home
  • Books
    • Secure Android Design and Development, 1st edition
    • Secure Android Development (Free edition)
  • AOSP
    • Battery
    • Build System
    • Core & System
    • Framework
    • HAL Layer
    • Performance
    • Security & Privacy
  • Automotive
  • Protocol
  • Downloads
Copyright - WordPress Theme by OceanWP