Skip to main content

A Survey: Android Architecture and Security Threats

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 383))

  • 466 Accesses

Abstract

Nowadays billions of individuals utilizing brilliant mobile phones and the dramatic development of cell phone apps, it is genius enthusiast for application commercial centres, like Google App Store, to completely check if an application is real. Surprisingly more terrible, late investigations have shown that more than 75% of applications in business sectors solicitation to gather information insignificant to the primary elements of the applications, which could cause spilling of private data or wasteful utilizations. Thusly, scholastic specialists and business against malware organizations have proposed numerous security systems to address the security issues of the Android gadgets. Considering the instruments and strategies which are diverse in nature and utilized in proposed works, they can be characterized into various classifications. In this overview, we talk about the current Android security problems and existing security authorization arrangement among 2010−2022 and attempt to order works and audit their basic functionalities. We survey a couple of works of each class.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rashidi B, Fung CJ (2015) A survey of android security threats and defenses. J Wirel Mob Networks Ubiquitous Comput Dependable Appl 6(3):3–35

    Google Scholar 

  2. Kunda D, Chishimba M (2018) A survey of android mobile phone authentication schemes. Mobile Netw Appl 1–9

    Google Scholar 

  3. Bhat P, Dutta K (2019) A survey on various threats and current state of security in android platform. ACM Comput Surv (CSUR) 52(1):1–35

    Article  Google Scholar 

  4. Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222

    Article  Google Scholar 

  5. Park JK, Choi S-Y (2015) Studying security weaknesses of android system. Int J Secur Appl 9(3):7–12

    Google Scholar 

  6. Latif M, Lakhrissi Y, Nfaoui EH, Es-Sbai N (2017) Review of mobile cross platform and research orientations. In: 2017 international conference on wireless technologies embedded and intelligent systems (WITS), pp 1–4

    Google Scholar 

  7. Shabtai A et al (2009) Google android: a state-of-the-art review of security mechanisms. arXiv preprint arXiv:0912.5101

  8. Philip J, Raju M (2019) A formal overview of application sandbox in android and iOS with the Need to secure sandbox against increasing number of malware attack. Indian J Comput Sci 4(3):32–40

    Article  Google Scholar 

  9. Spreitzenbarth M, Schreck T, Echtler F, Arp D, Hoffmann J (2015) Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques. Int J Inf Secur 14(2):141–153

    Article  Google Scholar 

  10. Wang X, Sun K, Wang Y, Jing J (2015) DeepDroid: dynamically enforcing enterprise policy on android devices. Ndss

    Google Scholar 

  11. Dhara MNBTM, Darji N, Malware attacks on smart phone its limitation and evolution to detect new techniques

    Google Scholar 

  12. Beyer C (2014) Mobile security: a literature review. Int J Comput Appl 97(8)

    Google Scholar 

  13. Ingale S, Gupta S (2014) Security in android based smartphone. Int J Appl Innov Eng Manag 3

    Google Scholar 

  14. Tesfay WB, Booth T, Andersson K (2012) Reputation based security model for android applications. In: 2012 IEEE 11th international conference on trust security and privacy in computing and communications, pp 896–901. [online] Available

    Google Scholar 

  15. Averlant G, Alata E, Kaâniche M, Nicomette V, Mao Y (2018) SAAC: secure android application context a runtime based policy and its architecture. In: 2018 IEEE 17th international symposium on network computing and applications (NCA), pp 1–5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepika Mourya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mourya, D., Srivastava, S., Pal, D., Dehraj, P. (2023). A Survey: Android Architecture and Security Threats. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_54

Download citation

Publish with us

Policies and ethics