自 2025 年 3 月 27 日起,我們建議您使用 android-latest-release
而非 aosp-main
建構及貢獻 AOSP。詳情請參閱「Android 開放原始碼計畫變更」。
硬體安全性最佳做法
透過集合功能整理內容
你可以依據偏好儲存及分類內容。
本頁提供相關建議,確保 Android 裝置上的硬體有助於提升裝置整體安全性,而非造成安全風險。
裝置記憶體
為 Android 裝置選取記憶體時,請務必瞭解潛在的安全性取捨。舉例來說,某些類型的記憶體可能會執行 Rowhammer 樣式的攻擊。
- Android 裝置應使用含有 Rowhammer 攻擊防護機制的記憶體。裝置製造商應與記憶體製造商密切合作,以取得更多詳細資料。
StrongBox KeyMint (舊稱 Keymaster)
請務必安全地儲存及處理裝置上的加密金鑰。這項作業通常會在 Android 裝置上進行,方法是使用在獨立環境 (例如受信任的執行環境 (TEE)) 中實作的硬體支援 KeyMint (先前為 Keymaster)。此外,我們也建議支援 StrongBox KeyMint,這項功能是在防竄改硬體中實作。
- 請確保 StrongBox Keymaster 在具備獨立 CPU、安全儲存空間、高品質真隨機數產生器、防竄改封裝,以及側通道抗性的環境中執行,以符合 StrongBox Keymaster 的資格規定。如要進一步瞭解相關規定,請參閱 Android 9 CDD 的 9.11.2 節。
這個頁面中的內容和程式碼範例均受《內容授權》中的授權所規範。Java 與 OpenJDK 是 Oracle 和/或其關係企業的商標或註冊商標。
上次更新時間:2025-08-27 (世界標準時間)。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["缺少我需要的資訊","missingTheInformationINeed","thumb-down"],["過於複雜/步驟過多","tooComplicatedTooManySteps","thumb-down"],["過時","outOfDate","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["示例/程式碼問題","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-08-27 (世界標準時間)。"],[],[],null,["This page contains recommendations to ensure\nthat the hardware present on Android devices contributes to raising the\noverall security of the device instead of compromising the security of\nthe device.\n\nDevice memory\n\nIt is important to understand the potential security tradeoffs when\nselecting memory for Android devices. For example, certain types of memory\ncan enable the execution of\n[Rowhammer](https://en.wikipedia.org/wiki/Row_hammer) style attacks.\n\n- Android devices should use memory that contains mitigations against Rowhammer style attacks. Device manufacturers should work closely with their memory manufacturers for additional details.\n\nStrongBox KeyMint (previously Keymaster)\n\nIt's important to securely store and handle cryptographic keys that are\navailable on the device. This is typically done on Android devices by\nutilizing a hardware-backed KeyMint (previously Keymaster) implemented in an isolated environment,\nsuch as the Trusted Execution Environment (TEE). It is further recommended to\nalso support a\n[StrongBox KeyMint](https://developer.android.com/privacy-and-security/keystore#StrongBoxKeyMint), which is implemented in\ntamper-resistant hardware.\n\n- Ensure that the StrongBox Keymaster is running in an environment that has a discrete CPU, secure storage, a high quality true random number generator, tamper resistant packaging, and side channel resistance to meet the requirements to qualify as a StrongBox Keymaster. See the Android 9 CDD, section 9.11.2 for more information on the requirements."]]