A Survey: Android Architecture and Security Threats

Authors

  • Deepika Mourya Department of Computer Science and Engineering, Noida Institute of Engineering and Technology, Noida, India
  • Dheeraj Pal Department of Computer Science and Engineering, Noida Institute of Engineering and Technology, Noida, India
  • Pooja Dehraj Department of Computer Science and Engineering, Noida Institute of Engineering and Technology, Noida, India

Keywords:

Android, Security, Android architecture, Privacy policy, Smartphones

Abstract

Now-a-days billions of individuals utilizing brilliant mobile phones and the dramatic development of cell phone apps, it is genius enthusiast for application commercial centres, like Google App Store, to completely check if an application is real. Surprisingly more terrible, late investigations have shown that more than 75% of applications in business sectors solicitation to gather information insignificant to the primary elements of the applications, which could cause spilling of private data or wasteful utilizations. Thusly, scholastic specialists and business against malware organizations have proposed numerous security systems to address the security issues of the Android gadgets. Considering the instruments and strategies which are diverse in nature and utilized in proposed works, they can be characterized into various classifications. In this overview, we talk about the current Android security problems and existing security authorization arrangement among 2010−2022 and attempt to order works and audit their basic functionalities. We survey a couple of works of each class.

Downloads

Download data is not yet available.

Downloads

Published

02-10-2022

How to Cite

[1]
D. Mourya, D. Pal, and P. Dehraj, “A Survey: Android Architecture and Security Threats”, IJRESM, vol. 5, no. 9, pp. 100–104, Oct. 2022.

Issue

Section

Articles