Back
 JIS  Vol.10 No.2 , April 2019
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
Abstract: The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have resorted to the use of mobile phones with a great percentile preferring android oriented systems. Similarly, the systems are susceptible to the various threats posed by technology with due summations showing that security flaws and unauthorized access to sensitive data pose a huge threat to the overarching efficacy of the android systems. The research presented lays a primal focus on how users can improve intrinsic android features through the use of Google services, rooting, custom kernels and ROM techniques. The research also focused on how Android security features can be improved when using or installing applications. Results indicate that the rooting process is the most conclusive and safest scheme. Summations drawn are indicative of the fact that system security is a moot research topic that requires further research into how it can be improved.
Cite this paper: Rahimi, N. , Nolen, J. and Gupta, B. (2019) Android Security and Its Rooting—A Possible Improvement of Its Security Architecture. Journal of Information Security, 10, 91-102. doi: 10.4236/jis.2019.102005.
References

[1]   ComScore Reports January 2016 US Smartphone Subscriber Market Share (2016).

[2]   Enck, W., Ongtang, M. and McDaniel, P. (2009) Understanding Android Security. IEEE Security & Privacy, 7, 50-57.
https://doi.org/10.1109/MSP.2009.26

[3]   Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M. (2010) Privilege Escalation Attacks on Android. International Conference on Information Security, Chengdu, 17-19 December 2010, 346-360.

[4]   Gunasekera, S. (2012) Android Security Architecture. In: Gunasekera, S., Ed., Android Apps Security, Apress, Berkeley, 31-45.
https://doi.org/10.1007/978-1-4302-4063-1_3

[5]   Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A. and Albayrak, S. (2010) An Android Application Sandbox System for Suspicious Software Detection. 5th International Conference on Malicious and Unwanted Software, Nancy, 19-20 October 2010, 55-62.
https://doi.org/10.1109/MALWARE.2010.5665792

[6]   Sun, S.T., Cuadros, A. and Beznosov, K. (2015) Android Rooting: Methods, Detection, and Evasion. 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Denver, 12-16 October 2015, 3-14.
https://doi.org/10.1145/2808117.2808126

[7]   Duffy, J. (2011) A Concise Guide to Android Rooting. Pcmag.
https://uk.pcmag.com/feature/112875/a-concise-guide-to-android-rooting

[8]   Gaikar, V. (2013) Android Rooting and Risks Involved.

[9]   Brickell, E.F., Hall, C.D., Cihula, J.F. and Uhlig, R. (2011) US Patent No. 7,908,653. US Patent and Trademark Office, Washington DC.

[10]   Android Open Source Project (2017).

[11]   Siddha, V., Ishiguro, K. and Hernandez, G.A. (2012) US Patent No. 8,254,285. US Patent and Trademark Office, Washington DC.

[12]   Georgiev, A.B., Sillitti, A. and Succi, G. (2014) Open Source Mobile Virtual Machines: An Energy Assessment of Dalvik vs. ART. IFIP International Conference on Open Source Systems, San José, 6-9 May 2014, 93-102.
https://doi.org/10.1007/978-3-642-55128-4_12

[13]   Dubey, A. and Misra, A. (2013) Android Security Attacks and Defenses. 51.

[14]   Nelenkov.blogspot.com (2017) Code Signing in Android’s Security Model.

[15]   Elgamal, T. and Hickman, K.E. (1997) US Patent No. 5,657,390. US Patent and Trademark Office, Washington DC.

[16]   Rahimi, N., Reed, J.J. and Gupta, B. (2018) On the Significance of Cryptography as a Service. Journal of Information Security, 9, 242-256.
https://doi.org/10.4236/jis.2018.94017

[17]   Cherdantseva, Y. and Hilton, J. (2013) A Reference Model of Information Assurance & Security. 2013 International Conference on Availability, Reliability and Security, Regensburg, 2-6 September 2013, 546-555.
https://doi.org/10.1109/ARES.2013.72

[18]   Security Tips/Android Developers.
https://developer.android.com/training/articles/security-tips

[19]   Brewis, M. (2017) How to Secure Android: 14 Top Tips for Securing Your Phone or Tablet. PC Advisor.
http://www.pcadvisor.co.uk/how-to/google-android/how-secure-android-14-top-tips-for-securing-your-phone-or-tablet-whatsapp-3637549/

[20]   Rahimi, N., Sinha, K., Gupta, B., Rahimi, S. and Debnath, N.C. (2016) LDEPTH: A Low Diameter Hierarchical p2p Network Architecture. 14th International Conference on Industrial Informatics, Poitiers, 19-21 July 2016, 832-837.
https://doi.org/10.1109/INDIN.2016.7819275

[21]   Lifehacker.com (2017).
http://lifehacker.com/how-secure-is-android-really-1446328680

[22]   Android Authority (2017) Best Speed Booster Apps for Android.
http://www.androidauthority.com/best-speed-booster-apps-android-108889/

[23]   (2017) How to Install Official CyanogenMod 11 ROM on Android One Devices. International Business Times, UK.
http://www.ibtimes.co.uk/how-install-official-cyanogenmod-11-rom-android-one-devices-1482622

 
 
Top