Android and iOS Security – An Analysis and Comparison Report
Author(s): BHARDWAJ, Akshay; PANDEY, Kailash; CHOPRA, Roopam
Author(s) keywords: Android, iOS, Mobile Application, security, Smartphone
Reference keywords: mobile security, software security
Abstract:
Today smartphones are so popular that users are fully dependent on them for their daily work. With rapid increase in smartphone applications, it became a tough job for app marketplace like google play store to check an app thoroughly for malwares and malicious content. As a result, users are themselves responsible to choose a safe app for use. Hence, many academic researchers and commercial security companies work on many security models and mechanism to identify these security threats. These works are classified in different categories with respect to its technology and working behavior. This paper stress on security mechanism of Android and iOS mobile operating system. We will compare the security features provided in Android and iOS supported smartphones.
References:
[1]. Macrumors, “iOS and android captures combined 98.4% share of smartphone market,” Feb. 2016 URL: http://www.macrumors.com/2016/02/18/ios-android-market-share-q4-15-gartner/
[2]. Wikipedia, HTC Dream, Data Retrieved on 5th may 2016 URL:https://en.wikipedia.org/wiki/HTC_Dream
[3]. Statista, “Number of available applications in the Google Play Store from December 2009 to February 2016,” URL: http://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/
[4]. W. Rothman, “Smart phone malware: The six worst offenders,” Feb. 2011, http://www.nbcnews.com/tech/mobile/smart-phone-malware-six-worst-offenders-f125248.
[5]. Yogita chittoria, Neha Aggarwal, “Application Security in Android-OS VS IOS” IJARCSSE Volume 4, Issue 5, May 2014 ISSN: 2277 128X URL:www.ijarcsse.com
[6]. Appbrain “Number of android applications,” May 9, 2016, http://www.appbrain.com/stats/number-of-android-apps.
[7]. Android vs iOS: which is the best mobile OS? David Nield , Feb 2016, URL:http://www.t3.com/news/android-vs-ios-showdown
[8]. Nikolay Elenkov, “Android Security Internals-An In-Depth Guide to Android’s Security Architecture” No Starch Press, Inc. , pp 1-20, ISBN-13: 978-1-59327-581-5.
[9]. R. Mittal, A. Kansal, and R. Channdra, “Empowering developers to estimate app energy consumption” August 2012, pp. 317–328, http://doi.acm.org/10.1145/2348543.2348583
[10]. O. R. E. Pereira and J. J. P. C. Rodrigues, “Survey and analysis of current mobile learning applications and technologies,” Dec. 2013, http://doi.acm.org/10.1145/2543581.2543594
[11]. B. Liu, S. Nath, R. Govindan, and J. Liu, “DECAF: Detecting and characterizing ad fraud in mobile apps,” April 2014, pp. 57–70, http://dl.acm.org/citation.cfm?id=2616448.2616455
[12]. E. Fernandes, B. Crispo, and M. Conti, “Fm 99.9, radio virus: Exploiting fm radio broadcasts for malware deployment,” Information Forensics and Security, IEEE Transactions on, vol. 8, no. 6, pp. 1027–1037, June 2013.
[13]. R. Fedler, J. Sch¨utte, and M. Kulicke, “On the effectiveness of malware protection on android,” June 2013.
[14]. C. Jarabek, D. Barrera, and J. Aycock, “Thinav: Truly lightweight mobile cloud-based anti-malware,” December 2012, pp. 209–218. http://doi.acm.org/10.1145/2420950.2420983
[15]. Official Developer “Traing: Declaring Permissions” , Data Retrieved On: 5th May,2016 URL:http://developer.android.com/training/permissions/declaring.html
[16]. K. Makan and S. Alexander-Bown, Android Security Cookbook. Packt Publishing, 2013.
[17]. Android, “Google android documents, android application sandboxing mechanism,” Online; accessed at May 25, 2015, URL: http://developer.android.com/training/articles/security-tips.html
[18]. P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. Gaur, M. Conti, and R. Muttukrishnan, “Android security: A survey of issues, malware penetration and defenses,” 2015, http://dx.doi.org/10.1109/COMST.2014.2386139
[19]. Oracle, “JAR File Specification”, http://docs.oracle.com/javase/7/docs/technotes/guides/jar/jar.html
[20]. SELinux Project, “SE for Android”, http://selinuxproject.org/page/SEAndroid
[21]. Wikipedia, "iOS", 2016, http://en.wikipedia.org/wiki/IOS
[22]. Jagdish Prasad Achara, Claude Castelluccia “Smartphone Security Overview” 5 dec 2012, https://www.google.co.in/search?q=smart+phone+security+overview&oq=smart+phone+security+overview&aqs=chrome..69i57j0l2.10252j0j7&sourceid=chrome&ie=UTF-8#
[23]. AlQershi, Fattoh, Muhammad AlQurishi, Sk Md Mizanur Rahman, and Atif AlAmri. "Android vs. iOS: The security battle." In Computer Applications and Information Systems (WCCAIS), 2014 World Congress on, pp. 18. IEEE, 2014. URL:http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6916629&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6916629
[24]. Apple Inc. “iOS security”, Oct. 2014, https://www.apple.com/privacy/docs/iOS_Security_Guide_Oct_2014.pdf
[25]. Apple Inc. “iOS security iOS 9 or later”, Sep. 2015 URL:https://www.apple.com/business/docs/iOS_Security_Guide.pdf
[26]. RiskIQ, "RiskIQ Reports Malicious Mobile Apps in Google Play Have Spiked Nearly 400 Percent", Feb 2014, https://www.riskiq.com/resources/press-releases
[27]. Rashid, Fahmida Y. "#BlackHat: Researchers upload dangerous app to Google Play store – Applications – SC Magazine Australia – Secure Business Intelligence". July 2014, URL: http://www.itnews.com.au/news/blackhat-researchers-upload-dangerous-app-to-google-play-store-310192
[28]. PC Advisor, "Mobile malware exaggerated by "charlatan" vendors, says Google engineer". Nov. 2011, http://www.pcadvisor.co.uk/news/network-wifi/mobile-malware-exaggerated-by-charlatan-vendors-says-google-engineer-3320818/
[29]. CVE Details , “Android 1.0 Security Vulnerabilities”, https://www.cvedetails.com/vulnerability/list/vendor_id-1224/product_id-22000/version_id-122349/Google-Android-1.0.html
[30]. Wikipedia , “Android Operating System: Security and Privacy”, Data Retrieved on: 5th may, 2016, https://en.wikipedia.org/wiki/Android_(operating_system)#Security_and_privacy
[31]. Android, “Security Enhancements in Android 4.2”, Data Retrieved on: 5th may,2016, https://source.android.com/security/enhancements/enhancements42.html
[32]. Android, “Security Enhancements in Android 4.3”, Data Retrieved on: 5th may,2016, https://source.android.com/security/enhancements/enhancements43.html
[33]. Wikipedia’ “Android operating system”, Data Retrieved on 6th May,2016, https://en.wikipedia.org/wiki/Android_(operating_system)#Security_and_privacy
[34]. Android,” Security Enhancements in Android 4.4”, Data Retrieved on: 5th may, 2016, https://source.android.com/security/enhancements/enhancements44.html
[35]. Androidpit, “Android 5.0 Security”, https://www.androidpit.com/android-5-0-lollipop-security
[36]. Android,” Security Enhancements in Android 5.0”, Data Retrieved on: 5th may,2016, https://source.android.com/security/enhancements/enhancements50.html
[37]. Android,” Security Enhancements in Android 6.0”, Data Retrieved on: 5th may, 2016, https://source.android.com/security/enhancements/enhancements60.html
[38]. Androidpit, “Android Marshmallow Features”, URL:https://www.androidpit.com/android-m-release-date-news-features-name#security
[39]. TechWorld, “Android Marshmallow Security Features”, URL:http://www.techworld.com/picture-gallery/security/android-marshmallows-10-most-important-security-features-3626468/#5
[40]. iPhone 1.1.1 Harder to Hack?, http://www.macrumors.com/2007/09/27/iphone-1-1-1-harder-to-hack/
[41]. Review: iPhone 2.0 software update, http://www.macworld.com/article/1134503/iphone2update.html?page=2
[42]. Intego, “The evolution of iOS Security and Privacy”, https://www.intego.com/mac-security-blog/the-evolution-of-ios-security-and-privacy-features/
[43]. Mark Wilson, “iPhone OS 3.0 Software Review: What To Expect”, URL: http://gizmodo.com/5292789/iphone-os-30-software-review-what-to-expect
[44]. Macworld, Macworld Staff, “ iOS 4: What you need to know”, http://www.macworld.com/article/1152167/ios4_need_to_know.html
[45]. Apple Support, URL: https://support.apple.com/en-us/HT202064
[46]. Jacqui Cheng, “Ars reviews iOS 4: what’s new, notable, and what needs work”, -Jun 21, 2010, http://arstechnica.com/apple/2010/06/ars-reviews-ios-4-whats-new-and-notable/7/
[47]. Seth Weintraub, “ iOS 5 'Unsecured Calls' warning lets users know if they are talking on unencrypted networks”, URL: http://9to5mac.com/2011/06/07/ios-5-unsecured-calls-warning-lets-users-know-if-they-are-talking-on-unencrypted-networks/
[48]. Cultomac, “ iOS 5.1 Adds Unannounced Security And Management Features”, March 9, 2012 , http://www.cultofmac.com/151991/ios-5-1-adds-unannounced-security-and-management-features-for-siri-and-location-services/
[49]. Jacqui Cheng, “Hands-on: Find My Friends is Apple’s Google Latitude”, http://arstechnica.com/apple/2011/10/hands-on-with-find-my-friends-apples-google-latitude/
[50]. Joshua Long , “The Evolution of iOS Security and Privacy Features”, February 29th, 2016, https://www.intego.com/mac-security-blog/the-evolution-of-ios-security-and-privacy-features/
[51]. Apple Suport, URL:https://support.apple.com/en-us/HT202074
[52]. Mittwoch, “What Apple Missed to Fix in iOS 7.1.1”, 23. April 2014, URL:http://www.andreas-kurtz.de/2014/04/what-apple-missed-to-fix-in-ios-711.html
[53]. Apple Support, “Find My iPhone Activation Lock”, URL:https://support.apple.com/en-us/HT201365
[54]. Apple Support, “Use Touch ID on iPhone and iPad”, URL:https://support.apple.com/en-us/HT201371
[55]. “iOS 7 Security: The good, the bad, and the controversy”, Oct. 4, 2013 URL:http://www.imore.com/ios-7-security-good-bad-and-controversy
[56]. Apple Support, “About the ‘Trust This Computer’ alert on your iPhone, iPad, or iPod touch” URL:https://support.apple.com/en-us/HT202778
[57]. Jason Murdock , “Apple iOS vs Google Android: Which is the more secure smartphone OS?”, March 3, 2016 URL:http://www.ibtimes.co.uk/apple-ios-vs-google-android-which-more-secure-smartphone-os-1547396
[58]. Yoni Heisler , “iOS apps aren’t any more secure than Android apps, study finds”, Nov 11, 2015 URL:https://bgr.com/2015/11/11/app-store-malware-ios-vs-android/
Article Title: Android and iOS Security – An Analysis and Comparison Report
Author(s): BHARDWAJ, Akshay; PANDEY, Kailash; CHOPRA, Roopam
Date of Publication: 2016-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2016.01.02
Issue: Volume 5, Issue 1, Year 2016
Section: Advances in Information Security Research
Page Range: 32-44 (13 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.