自 2025 年 3 月 27 日起,我们建议您使用 android-latest-release
而非 aosp-main
构建 AOSP 并为其做出贡献。如需了解详情,请参阅 AOSP 的变更。
硬件安全性最佳实践
使用集合让一切井井有条
根据您的偏好保存内容并对其进行分类。
此页面包含的建议可确保 Android 设备上的硬件有助于提高设备的整体安全性,而不会影响设备的安全性。
设备内存
在为 Android 设备选择内存时,请务必了解可能的安全权衡。例如,采用某些类型的内存时,可能会给 Rowhammer 式攻击带来可乘之机。
- Android 设备使用的内存应该包含针对 Rowhammer 式攻击的缓解措施。设备制造商应与其内存制造商密切合作,以了解更多详情。
StrongBox Keymaster
请务必安全地存储和处理设备上可用的加密密钥。在 Android 设备上,通过利用在隔离环境(例如可信执行环境 (TEE))中实现的硬件支持 Keymaster 通常可实现此目的。此外,还建议支持 StrongBox Keymaster(这是在防篡改硬件中实现的)。
- 确保 StrongBox Keymaster 在具有独立 CPU、安全存储、高品质的真随机数生成器、防篡改包装和防旁路攻击功能的环境中运行,以符合成为 StrongBox Keymaster 的要求。如需详细了解这些要求,请参阅 Android 9 CDD 第 9.11.2 节。
本页面上的内容和代码示例受内容许可部分所述许可的限制。Java 和 OpenJDK 是 Oracle 和/或其关联公司的注册商标。
最后更新时间 (UTC):2025-03-26。
[null,null,["最后更新时间 (UTC):2025-03-26。"],[],[],null,["This page contains recommendations to ensure\nthat the hardware present on Android devices contributes to raising the\noverall security of the device instead of compromising the security of\nthe device.\n\nDevice memory\n\nIt is important to understand the potential security tradeoffs when\nselecting memory for Android devices. For example, certain types of memory\ncan enable the execution of\n[Rowhammer](https://en.wikipedia.org/wiki/Row_hammer) style attacks.\n\n- Android devices should use memory that contains mitigations against Rowhammer style attacks. Device manufacturers should work closely with their memory manufacturers for additional details.\n\nStrongBox KeyMint (previously Keymaster)\n\nIt's important to securely store and handle cryptographic keys that are\navailable on the device. This is typically done on Android devices by\nutilizing a hardware-backed KeyMint (previously Keymaster) implemented in an isolated environment,\nsuch as the Trusted Execution Environment (TEE). It is further recommended to\nalso support a\n[StrongBox KeyMint](https://developer.android.com/privacy-and-security/keystore#StrongBoxKeyMint), which is implemented in\ntamper-resistant hardware.\n\n- Ensure that the StrongBox Keymaster is running in an environment that has a discrete CPU, secure storage, a high quality true random number generator, tamper resistant packaging, and side channel resistance to meet the requirements to qualify as a StrongBox Keymaster. See the Android 9 CDD, section 9.11.2 for more information on the requirements."]]