Android Security and Its Rooting—A Possible Improvement of Its Security Architecture

  • Rahimi N
  • Nolen J
  • Gupta B
N/ACitations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have resorted to the use of mobile phones with a great percentile preferring an-droid oriented systems. Similarly, the systems are susceptible to the various threats posed by technology with due summations showing that security flaws and unauthorized access to sensitive data pose a huge threat to the overarch-ing efficacy of the android systems. The research presented lays a primal focus on how users can improve intrinsic android features through the use of Google services, rooting, custom kernels and ROM techniques. The research also focused on how Android security features can be improved when using or installing applications. Results indicate that the rooting process is the most conclusive and safest scheme. Summations drawn are indicative of the fact that system security is a moot research topic that requires further research into how it can be improved.

Cite

CITATION STYLE

APA

Rahimi, N., Nolen, J., & Gupta, B. (2019). Android Security and Its Rooting—A Possible Improvement of Its Security Architecture. Journal of Information Security, 10(02), 91–102. https://doi.org/10.4236/jis.2019.102005

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free