The advent of technology brought forth a myriad of developments that have
streamlined the manner through which people operate. With the growing
need to be at the forefront of communication and information, people have
resorted to the use of mobile phones with a great percentile preferring android
oriented systems. Similarly, the systems are susceptible to the various
threats posed by technology with due summations showing that security flaws
and unauthorized access to sensitive data pose a huge threat to the overarching
efficacy of the android systems. The research presented lays a primal focus
on how users can improve intrinsic android features through the use of
Google services, rooting, custom kernels and ROM techniques. The research
also focused on how Android security features can be improved when using
or installing applications. Results indicate that the rooting process is the most
conclusive and safest scheme. Summations drawn are indicative of the fact
that system security is a moot research topic that requires further research
into how it can be improved.
References
[1]
ComScore Reports January 2016 US Smartphone Subscriber Market Share (2016).
[2]
Enck, W., Ongtang, M. and McDaniel, P. (2009) Understanding Android Security. IEEE Security & Privacy, 7, 50-57. https://doi.org/10.1109/MSP.2009.26
[3]
Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M. (2010) Privilege Escalation Attacks on Android. International Conference on Information Security, Chengdu, 17-19 December 2010, 346-360.
Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A. and Albayrak, S. (2010) An Android Application Sandbox System for Suspicious Software Detection. 5th International Conference on Malicious and Unwanted Software, Nancy, 19-20 October 2010, 55-62. https://doi.org/10.1109/MALWARE.2010.5665792
[6]
Sun, S.T., Cuadros, A. and Beznosov, K. (2015) Android Rooting: Methods, Detection, and Evasion. 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Denver, 12-16 October 2015, 3-14. https://doi.org/10.1145/2808117.2808126
[7]
Duffy, J. (2011) A Concise Guide to Android Rooting. Pcmag. https://uk.pcmag.com/feature/112875/a-concise-guide-to-android-rooting
[8]
Gaikar, V. (2013) Android Rooting and Risks Involved.
[9]
Brickell, E.F., Hall, C.D., Cihula, J.F. and Uhlig, R. (2011) US Patent No. 7,908,653. US Patent and Trademark Office, Washington DC.
[10]
Android Open Source Project (2017).
[11]
Siddha, V., Ishiguro, K. and Hernandez, G.A. (2012) US Patent No. 8,254,285. US Patent and Trademark Office, Washington DC.
[12]
Georgiev, A.B., Sillitti, A. and Succi, G. (2014) Open Source Mobile Virtual Machines: An Energy Assessment of Dalvik vs. ART. IFIP International Conference on Open Source Systems, San José, 6-9 May 2014, 93-102. https://doi.org/10.1007/978-3-642-55128-4_12
[13]
Dubey, A. and Misra, A. (2013) Android Security Attacks and Defenses. 51.
[14]
Nelenkov.blogspot.com (2017) Code Signing in Android’s Security Model.
[15]
Elgamal, T. and Hickman, K.E. (1997) US Patent No. 5,657,390. US Patent and Trademark Office, Washington DC.
[16]
Rahimi, N., Reed, J.J. and Gupta, B. (2018) On the Significance of Cryptography as a Service. Journal of Information Security, 9, 242-256. https://doi.org/10.4236/jis.2018.94017
[17]
Cherdantseva, Y. and Hilton, J. (2013) A Reference Model of Information Assurance & Security. 2013 International Conference on Availability, Reliability and Security, Regensburg, 2-6 September 2013, 546-555. https://doi.org/10.1109/ARES.2013.72
Brewis, M. (2017) How to Secure Android: 14 Top Tips for Securing Your Phone or Tablet. PC Advisor. http://www.pcadvisor.co.uk/how-to/google-android/how-secure-android-14-top-tips-for-securing-your-phone-or-tablet-whatsapp-3637549/
[20]
Rahimi, N., Sinha, K., Gupta, B., Rahimi, S. and Debnath, N.C. (2016) LDEPTH: A Low Diameter Hierarchical p2p Network Architecture. 14th International Conference on Industrial Informatics, Poitiers, 19-21 July 2016, 832-837. https://doi.org/10.1109/INDIN.2016.7819275
Android Authority (2017) Best Speed Booster Apps for Android. http://www.androidauthority.com/best-speed-booster-apps-android-108889/
[23]
(2017) How to Install Official CyanogenMod 11 ROM on Android One Devices. International Business Times, UK. http://www.ibtimes.co.uk/how-install-official-cyanogenmod-11-rom-android-one-devices-1482622