B2G App Security Model/Threat Model: Difference between revisions

Jump to navigation Jump to search
Line 59: Line 59:


=== App Host Compromise===
=== App Host Compromise===
Similar to the vulnerable web application case – a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App.
Similar to the vulnerable web application case – the question is asked whether a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App.


====Potential Countermeasures====
====Potential Countermeasures====
177

edits

Navigation menu