Abstract
Nowadays billions of individuals utilizing brilliant mobile phones and the dramatic development of cell phone apps, it is genius enthusiast for application commercial centres, like Google App Store, to completely check if an application is real. Surprisingly more terrible, late investigations have shown that more than 75% of applications in business sectors solicitation to gather information insignificant to the primary elements of the applications, which could cause spilling of private data or wasteful utilizations. Thusly, scholastic specialists and business against malware organizations have proposed numerous security systems to address the security issues of the Android gadgets. Considering the instruments and strategies which are diverse in nature and utilized in proposed works, they can be characterized into various classifications. In this overview, we talk about the current Android security problems and existing security authorization arrangement among 2010−2022 and attempt to order works and audit their basic functionalities. We survey a couple of works of each class.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rashidi B, Fung CJ (2015) A survey of android security threats and defenses. J Wirel Mob Networks Ubiquitous Comput Dependable Appl 6(3):3–35
Kunda D, Chishimba M (2018) A survey of android mobile phone authentication schemes. Mobile Netw Appl 1–9
Bhat P, Dutta K (2019) A survey on various threats and current state of security in android platform. ACM Comput Surv (CSUR) 52(1):1–35
Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222
Park JK, Choi S-Y (2015) Studying security weaknesses of android system. Int J Secur Appl 9(3):7–12
Latif M, Lakhrissi Y, Nfaoui EH, Es-Sbai N (2017) Review of mobile cross platform and research orientations. In: 2017 international conference on wireless technologies embedded and intelligent systems (WITS), pp 1–4
Shabtai A et al (2009) Google android: a state-of-the-art review of security mechanisms. arXiv preprint arXiv:0912.5101
Philip J, Raju M (2019) A formal overview of application sandbox in android and iOS with the Need to secure sandbox against increasing number of malware attack. Indian J Comput Sci 4(3):32–40
Spreitzenbarth M, Schreck T, Echtler F, Arp D, Hoffmann J (2015) Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques. Int J Inf Secur 14(2):141–153
Wang X, Sun K, Wang Y, Jing J (2015) DeepDroid: dynamically enforcing enterprise policy on android devices. Ndss
Dhara MNBTM, Darji N, Malware attacks on smart phone its limitation and evolution to detect new techniques
Beyer C (2014) Mobile security: a literature review. Int J Comput Appl 97(8)
Ingale S, Gupta S (2014) Security in android based smartphone. Int J Appl Innov Eng Manag 3
Tesfay WB, Booth T, Andersson K (2012) Reputation based security model for android applications. In: 2012 IEEE 11th international conference on trust security and privacy in computing and communications, pp 896–901. [online] Available
Averlant G, Alata E, Kaâniche M, Nicomette V, Mao Y (2018) SAAC: secure android application context a runtime based policy and its architecture. In: 2018 IEEE 17th international symposium on network computing and applications (NCA), pp 1–5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mourya, D., Srivastava, S., Pal, D., Dehraj, P. (2023). A Survey: Android Architecture and Security Threats. In: Ranganathan, G., Fernando, X., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 383. Springer, Singapore. https://doi.org/10.1007/978-981-19-4960-9_54
Download citation
DOI: https://doi.org/10.1007/978-981-19-4960-9_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-4959-3
Online ISBN: 978-981-19-4960-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)