REVIEW ON ANDROID SECURITY VULNERABILITIES

Main Article Content

SATISH S MORE VAISHALI S SARDAR PRAMOD T TALOLE

Abstract

In our day to day life we are more careful about the security. As the day passes, We provide the different security technology to different applications. The security is playing the important role of our life, by using security we protect our data. We provide the best security to the money or important data. Starting from our handheld device to computers to smart appliances, our world is digitized. Thus a smart home would be the next step for a better future. With the popularity of Android smart phones everyone finds it convenient to make transactions through these smart phones. And the users of these smart phones, in most cases unaware of different types of threats. The purpose for this survey paper is to conduct a survey on users to get the information about the security vulnerabilities they are creating unknowingly, bringing forward some security frameworks for these threats & giving a basic knowledge to the new comer to the android about android OS architecture and the threats to this architecture. The security in android based device is based on the permission based security model. Android OS allows each developer to define their access to the resource and OS allows developer to do this. But this leads the vulnerability in OS functionality.

Article Details

Section
Articles