Code and Data Security Risk in Android


Brij K. Misra; Smita Tripathi

Published in:

HCTL Open International Journal of Technology Innovations and Research (IJTIR), eISSN: 2321-1814

Published on:



Volume 14, April 2015, ISBN:978-1-62951-946-3.

Copyright Information:

© 2015 by the Authors; Licensed by HCTL Open, India.

License Information:

This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution 4.0 International License.


For a developer Security of Code and Data is very important and this paper presents risk involved in Android platform’s mobile and non-mobile applications. On Android platform for storing data commonly used techniques are by popular open source SQLite database, Preferences, External storage, for graphics common techniques are using Drawables like Xml resources and Images, and for programming java is used. C and C++ by Android Native Development Kit (NDK), Python by Scripting Language for Android (SL4A) and other languages are also used to program Android applications. Though All these commonly used techniques but code and data are easily visible to anyone by using right tools or reverse engineering. Most of the processes discussed are executable only on rooted Androids. Rooting Android is same as getting Super-user SU permission on Linux and because of Android itself is based on Linux and being totally open source getting super-user permission is not a very difficult task.


Android, SQLite database, Preferences, External-storage, Assets, XML

Cite this Article

Brij K. Misra; Smita Tripathi, Code and Data Security Risk in Android, HCTL Open International Journal of Technology Innovations and Research (IJTIR), Volume 14, April 2015, eISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3.

Download Full-Text PDF

It appears you do not have a PDF plugin for this browser. No issues.. you can click here to download this Full-Text PDF file.

Certificate of Contribution

Certificate of Contribution