Raman Deep

What A Native Developer Should Know About Android Security?

First version of the Android was built over the Linux 2.6 kernel and is customised to embedded (smartphone or tablet) needs. This article provides a basic overview of the Android security architecture and…

Let us log

GDB Logging Function Parameters, Part 2

In this second part on the topic, let us write a GDB script to log the parameters of a desired function, and also see how the application state can be modified by changing…

Hmm... time to debug

GDB: Logging Function Parameters, Part 1

Sometimes an application’s release version crashes in particular scenarios, but the debug version does not — and to make matters worse, the call-trace gets corrupted. It’s then very difficult to find the cause…

This is how we get in...

Modify-function-return-value hack! — Part 2

In my previous article on this topic, we discussed some guidelines on how to write a secure application in C. The article focused on functions defined in the application itself. Now, we will…

Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.