Comparative Ios Android
Comparative Ios Android
Review Article
article info a b s t r a c t
Article history:                                                           Smartphone usage has increased exponentially in the recent years. Android and iOS are the most
Received 5 May 2020                                                        popular smartphone platforms, while the ease of use along with the computational power to handle
Accepted 23 January 2021                                                   a wide array of applications attracts millions of users worldwide, also raises the security concerns
Available online xxxx
                                                                           on these platforms. This paper presents a comparative analysis between Android and iOS on a wide
Keywords:                                                                  range of security aspects. It analyzes data for the period 2015-2019 and gives a detailed snapshot
Android                                                                    of not only the quantum of vulnerabilities, but also their impact. In addition, the paper leverages
iOS                                                                        the well-established security triad i.e. CIA (Confidentiality, Integrity, Availability) to compare both the
Malware                                                                    operating systems. The comprehensive and pragmatic approach taken in the paper makes it easier to
Security                                                                   infer that Android is more susceptible to security breaches and malware attacks as compared to iOS.
Smartphones
                                                                           Hence, researchers should divert their efforts and focus on finding solutions to problems pertaining to
Vulnerabilities
                                                                           Android. The paper concludes by laying down future research directions and scope of work, which can
                                                                           be leveraged not only by application developers, but also by researchers. This will help make Android
                                                                           safer for users and will further increase its demand as a mobile operating system.
                                                                                                                                               © 2021 Elsevier Inc. All rights reserved.
Contents
    1.    Introduction.........................................................................................................................................................................................................................     1
    2.    Related work .......................................................................................................................................................................................................................      2
    3.    Comparison between Android and iOS............................................................................................................................................................................                            3
           3.1.  System architecture ...............................................................................................................................................................................................                3
           3.2.  Security ...................................................................................................................................................................................................................       5
           3.3.  Isolation mechanism..............................................................................................................................................................................................                  5
           3.4.  Encryption mechanism..........................................................................................................................................................................................                     5
           3.5.  App permissions.....................................................................................................................................................................................................               5
           3.6.  Auto erase mechanism ..........................................................................................................................................................................................                    6
           3.7.  Application provenance.........................................................................................................................................................................................                    6
    4.    Software vulnerabilities common in Android and iOS ..................................................................................................................................................                                     7
    5.    Data collection ....................................................................................................................................................................................................................      7
    6.    Vulnerability trends in Android vs. iOS ...........................................................................................................................................................................                       7
    7.    Malware attacks in Android and iOS ...............................................................................................................................................................................                       11
    8.    Research directions and future scope ..............................................................................................................................................................................                      11
    9.    Conclusion ...........................................................................................................................................................................................................................   12
          Declaration of competing interest....................................................................................................................................................................................                    13
          References ...........................................................................................................................................................................................................................   13
1. Introduction
https://doi.org/10.1016/j.cosrev.2021.100372
1574-0137/© 2021 Elsevier Inc. All rights reserved.
S. Garg and N. Baliyan                                                                                     Computer Science Review 40 (2021) 100372
2. Related work
Then, MSR classification was analyzed based on the user ex-                   3.1. System architecture
periences. These steps were then combined into an application
installation procedure. The discussed approaches fail to enforce                  Android is a Linux-based mobile OS with different layers,
access control mechanisms to access a resource or data in the                 namely, kernel, hardware abstraction layer, Android runtime,
permission sets, thereby bypassing the permissions once the root              libraries, application framework and applications as shown in
privilege is obtained. The customized Linux kernel of Android                 Fig. 4. The application architecture of Android is designed in
can make it vulnerable when the root privileges are obtained.                 such a way that it simplifies the reuse of components. Modular
Code-signing method is used by Android, which contains the                    system components and services allow the applications to use
                                                                              each other’s capabilities. It also allows components to be replaced
self-signed certificates of developers without verifying the certi-
                                                                              by the user [17]. Functionality of these layers is described as
fication authority [11]. Cho and Seo [12] demonstrated a method
                                                                              follows:
to mount a malware by exploiting the code-signing process used
                                                                                  Kernel — It supports and manages core system services like
in Android. They also proposed a countermeasure to prevent this               process, memory, security, network, etc.
attack. Due to this, repackaged malware can be easily distributed.                Hardware Abstraction Layer (HAL) — It acts as an inter-
    The security mechanisms in iOS are stronger as compared to                face for communicating the Android application/framework with
Android. However, researches in the past have shown how iOS                   hardware-specific device drivers such as camera, Bluetooth, etc.
is vulnerable to malware attacks. The studies [13–15] revealed                HAL is hardware-specific and implementation varies from vendor
that when SSH server is actively running, iOS can be easily jail-             to vendor.
broken. Teufl et al. [14] also analyzed that backup stored on                     Android Runtime (ART) — ART is introduced as a new runtime
the iTunes can be easily attacked by using different techniques.              environment in newer Android versions (version 5.0 onwards).
Brute-force attack can be performed on the encrypted backup.                  During app installation, it uses ahead-of-time (AOT) and just-in-
If the backup is not encrypted, the attacker can gain access and              time (JIT) compilation, which compiles the Dalvik bytecode into
manipulate with the backup files. Zdziarski [16] also detected                native binaries (ELF format). This optimizes garbage collection
various attack points, back doors, and surveillance mechanisms                and power assumption and achieves high runtime performance.
in iOS devices. He identified that iOS can be easily accessed                     Native Libraries — Core system services and different com-
via Universal Serial Bus (USB), Wi-fi or when paired with the                 ponents of Android like ART and HAL are built from the na-
compromised system. An attacker can target the iOS device on a                tive libraries, which are written in C/C++. There are different
                                                                              libraries, which provide support in building user interface appli-
Wi-Fi network by scanning TCP:62078 and can authenticate this
                                                                              cation framework, drawing graphics and accessing database.
pairing record. Moreover, the attacker can steal sensitive user
                                                                                  Application framework — Android SDK provides tool and API
information when a trusted relationship between a system and
                                                                              libraries to develop applications on Android java. This framework
iOS device is established.                                                    is known as Android Application Framework. Important features
    The discussed approaches are not comprehensive enough to                  are database for storing data, support for audio, video and image
present all the security aspects of Android and iOS. Most of the re-          formats, debugging tools, etc.
search articles lack the holistic view of smartphone vulnerabilities              System applications — Applications are located at the top
and impact in terms of confidentiality, integrity and availability.           most layer of the Android stack. These consist of both native
This study is first of its kind, which covers all the security aspects        and third-party applications such as web browser, email, SMS
of mobile platforms.                                                          messenger, etc., which are installed by the user.
                                                                                  The iOS is OS X based mobile OS, which is a variant of a BSD
                                                                              UNIX kernel running on top of a micro kernel called Mach. iOS has
3. Comparison between Android and iOS
                                                                              a layered architecture. There is no direct communication since
                                                                              it has an intermediate layer between the applications and the
   Android and iOS are the most popular mobile platforms avail-               hardware. Basics services in iOS are handled by the lower layers,
able in the market. The on-going Android vs. iOS battle seems to              namely, Core Services layer and Core OS layer, whereas upper
be never ending. Section 3 elaborates this in terms of different              layers like Media layer and Cocoa Touch layer provide the user
parameters, with more focus on security aspects.                              interface and sophisticated graphics [18]. The layered architecture
                                                                          3
S. Garg and N. Baliyan                                                                                  Computer Science Review 40 (2021) 100372
of iOS is shown in Fig. 5. The different layers of iOS architecture           Media Layer —    This layer is responsible for graphics, au-
are described as follows:
                                                                          dio and video capabilities. Media layer consists of three differ-
    Hardware — This layer contains the physical chips, which are
soldered to the iOS circuitry.                                            ent frameworks — Graphic framework, Audio framework and
    Core OS Layer — It is the bottommost layer, which interacts           video framework. These frameworks help in accessing photos and
directly with the hardware. It has the operating system above
which the other layers reside. This layer takes care of memory            videos stored on the device, to manipulate the images through
management (allocation and de-allocation once the application             filters and provide support for 2D drawings.
has finished using it), file management, network management,
etc.                                                                          Cocoa Touch Layer — It provides key frameworks for building
    Core Services Layer — This forms the foundation layer on              iOS apps and defines their appearance. This layer is responsi-
which above layers are built. It provides several features like
                                                                          ble for fundamental technologies like multitasking, touch-based
data protection, iCloud storage, file sharing support, XML Support
features, SQLite database, In-App purchases, etc.                         input, push notifications, and many high-level system services.
                                                                      4
S. Garg and N. Baliyan                                                                                       Computer Science Review 40 (2021) 100372
3.3. Isolation mechanism                                                       Permissions control and regulate the access to device re-
                                                                            sources, once an app is downloaded on the device. In most of the
   Sandbox environment is provided for each and every appli-                cases users are not aware about the permissions which applica-
cation executing in the device, i.e., every application executes            tions are accessing, thereby causing serious security concerns.
in its own environment. In this way they cannot modify other                   In Android, list of all permissions which an app needs are
application.                                                                shown to the users while installing the app. User can then decide
   In Android, applications are separated from each other and               whether that app needs that particular permission or not. In some
from the system’s kernel; however, permissions are given to the             cases, if the user denies certain permissions to an app, then it
applications to access the system resources. Isolation mecha-               stops installing. Attackers can misuse the permissions in Android.
nism does not allow to access resources beyond the approved                 They can force the users to allow certain permissions, which
permissions. Isolation from kernel prevents gaining access to               can steal their sensitive information. Different types of attacks
the administrative control. As a result, attacker is not able to            can be performed using permissions, namely, data loss attacks,
compromise with other applications running on the Android.                  data integrity attacks, Denial of Service (DoS) and Distributed DoS
However, an application can neither launch other applications               (DDoS) attacks. The permission system in Android is not effective
on the system using certain permissions nor they can check the              since security decisions are handled by the device users. This
programming logic of other applications [21]. An app can launch             may compromise with the security aspect of Android as majority
                                                                        5
S. Garg and N. Baliyan                                                                                            Computer Science Review 40 (2021) 100372
Table 1
Summary of differences between Android and iOS.
 Feature         Sub feature            Android                                                          iOS
 Source model                           Open-source                                                      Closed, but iOS components are open source
 Architecture    Kernel                 Linux                                                            OS X, UNIX
                 Language               Dalvik (Java)                                                    Objective C
                 Layers                 Kernel — management of core system services — process,           Hardware — contains the physical chips
                                        memory, security, network                                        Core OS — layer takes care of memory management
                                        HAL— interface for communicating the Android application/        (allocation and de-allocation once the application has
                                        framework with hardware-specific device drivers such as          finished using it), file management, network management,
                                        camera, Bluetooth, etc.                                          etc
                                        Libraries — helps in building user interface, graphics drawing   Core services — provides several features like data
                                        and database access                                              protection, iCloud storage, file sharing support, XML Support
                                        Application framework — features are database for storing        features, SQLite database, In-App purchases, etc.
                                        data, support for audio, video and image formats, debugging      Media — responsible for graphics, audio and video
                                        tools                                                            capabilities
                                        Applications — native and third-party applications such as       Cocoa touch — provides key frameworks for building iOS
                                        web browser, email, SMS messenger, etc., which are installed     apps and defining their appearance.
                                        by the user.
 Security        Application            Individual sandbox for each app with user’s permission to        Shared sandbox for all apps; no permission required from
                 isolation              access system resources                                          the users
                 Encryption             Previous versions support FDE, later versions support TEE and Hardware encryption + Data protection class
                                        FBE
                 App permissions        Shown to the users                                               Not shown to the users
                 Auto erase             No                                                               Yes
 Application     App distribution       Google play store + third party app markets                      Official App store
 provenance      Vetting process        Partial                                                          Yes
                 Digital signature      Yes                                                              Yes
Table 2
Common vulnerabilities in Android and iOS.
 Vulnerability            Description
 Gain information         This vulnerability exposes sensitive information to the unauthorized attackers. Attackers can gain information using malicious scripts in the
                          applications.
 Gain privileges          It can occur when an attacker gains root or administrative rights, as a result of which normal security checks by OS are disabled.
 Bypass something         This vulnerability occurs when attackers can evade authentication mechanisms. Attackers can access unprotected file and can attack
                          protected applications by evading the authentication system.
 Overflow                 This vulnerability occurs when the buffer is overwritten by extra data, which is inserted by some malicious script. It can lead to serious
                          crashes in the system, which can damage files and information.
 Memory corruption        Memory corruption vulnerability occurs when software tries to read/ write to memory location, which is outside the bounded buffer. As a
                          result of this, attacker can access sensitive and private information and can alter the control flow.
 Denial of Service        Attackers can exploit this vulnerability by making the resources unavailable to the legitimate users. Improper handling of the resources like
 (DoS)                    memory, file, and database storage can result in denial of service.
 Code execution           Malicious code can be implanted in the user’s input, which can execute arbitrary code. Arbitrary code can then alter the control flow of
                          software, thereby changing or deleting the important data.
 SQL Injection            Attacker inserts controlled data in the SQL query, which can alter the database, access the sensitive information or can bypass the security
                          checks in the system. SQL injection is commonly seen in database driven websites.
 Cross site scripting     XSS vulnerability occurs when a malicious data is inserted in the web application via a web request. The malicious script can change the
 (XSS)                    HTML content of a web page, access tokens of the sessions, cookies, or any other sensitive information used by the browser.
 Directory traversal      Directory traversal or path traversal vulnerability occurs when the attacker constructs a pathname using a controlled input to access
                          directory or file located outside the restricted directory. As a result, the attacker is able to read arbitrary files on the target system.
 HTTP response            This vulnerability arises when the data from the HTTP request enters a web application. HTTP requests may contain CRLF (carriage return
 splitting                (\r) and line feed (\n)) characters, which are inserted in the HTTP response header and sent to the web user without validating for malicious
                          characters.
4. Software vulnerabilities common in Android and iOS                                   and extracts corresponding details. Web-based scraper was able
                                                                                        to extract all vulnerabilities in the iOS and Android category from
    Vulnerability can be defined as a weakness, which an attacker                       CVE details. We collected 1655 CVE IDs of iOS and 2563 CVE IDs
can exploit potentially to carry out unauthorized actions in a                          of Android, with a total of 4218 CVE IDs. Fig. 10 explains the
network or a system [30]. Vulnerabilities in mobile devices can                         process of web-based scraping. After scraping the data, data is
arise due to lack of security practices by users and from poor                          preprocessed, where the unnecessary data elements (number of
technical controls. Software vulnerabilities are analyzed based on                      exploits, update date, etc.) are removed.
different technical parameters like causes, techniques, severity
levels and software systems [31]. Common vulnerabilities seen
in Android and iOS are shown in Table 2.                                                6. Vulnerability trends in Android vs. iOS
Fig. 13. Year wise vulnerability distribution for Android.. (For interpretation of the references to color in this figure legend, the reader is referred to the web version
of this article.)
Fig. 14. Year wise vulnerability distribution for iOS.. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of
this article.)
Table 3                                                                                 maintain same color coding and order. Table 4 shows the increase
Distribution of Android & iOS vulnerability types.                                      and decrease for both Android and iOS.
 Vulnerability type(s)                  Android iOS      Total Android % iOS %              On analyzing the mean severity scores of Android and iOS,
 Unidentified                      836            212    1048   80%        20%          it is evident that Android vulnerabilities are more severe (mean
 DoS exec code overflow Mem. Corr. 66             561    627    11%        89%
                                                                                        score 6.9) as compared to iOS vulnerabilities (mean score 6.2).
 Info                              259            181    440    59%        41%
 Exec code                         310            56     366    85%        15%          Fig. 15 shows the mean severity score of both Android and iOS
 DoS                               191            95     286    67%        33%          from 2015–2019.
 Overflow                          256            7      263    97%        3%               Another level of comparison is the access level. Access level
 Priv                              215            9      224    96%        4%
                                                                                        is defined as how the vulnerability is exploited. Access levels can
 Bypass                            97             105    202    48%        52%
 Bypass +Info                      40             55     95     42%        58%          be local, remote or local network. Table 5 shows the percentage
 Exec code overflow                56             26     82     68%        32%          distribution of different access levels of the vulnerabilities in both
 Overflow Mem. Corr.               9              72     81     11%        89%          Android and iOS. It is evident that 25% vulnerabilities in Android
 DoS exec code Mem. Corr.          10             66     76     13%        87%          are exploited locally, while iOS vulnerabilities are 85% exploited
 Others                            218            210    428    51%        49%
 Total                             2563           1655   4218   61%        39%
                                                                                        remotely.
                                                                                            Access complexity is another parameter for comparing An-
                                                                                        droid and iOS vulnerabilities. Access complexity measures the
                                                                                        complexity of the attack, which is required to exploit the vulner-
unique vulnerability. The parts are stacked up, usually vertically.                     ability once an attacker has gained access to the target system.
The height of each colored stack represents the percentage pro-                         Access complexity can be low, medium and high. Low value
                                                                                        means that specialized access conditions or extenuating circum-
portion of that vulnerability at a given point in year. We have
                                                                                        stances do not exist, medium specifies the access conditions are
sorted vulnerabilities according to the starting year for Android;                      somewhat specialized and high means specialized access condi-
however, this is not applicable for iOS stack area graph so as to                       tions exist. Table 6 shows the access complexity levels for both
                                                                                    9
S. Garg and N. Baliyan                                                                                                             Computer Science Review 40 (2021) 100372
Table 4
Distribution of Android & iOS vulnerability types.
 Vulnerability type(s)               Android             iOS                 Remarks
 Unidentified                        4% to 55% ↑         10% to 38% ↑        • Open source nature of Android
                                                                             • Jailbreaking in iOS
 Exec code                           12% to 14% ↑        4% to 0% ↓          • Buffer overflow in OpenJPEG 2.1.1 in Android
                                                                             • Use-after-free issue addressed with improved memory management in iOS
 Others                              9% to 7% ↓          11% to 3% ↓         • Regular software upgrades in Android and iOS
 DoS                                 3% to 7% ↑          5% to 3% ↓          • Unhandled Java-level Null Pointer Exceptions (NPEs) in Android
                                                                             • Frequent software upgrades in iOS
 Bypass                              5% to 6% ↑          7% to 0% ↓          • Weak security policies in Android
                                                                             • Improved checks in iOS
 Exec code overflow                  9% to 4% ↓          2% to 1% ↓          • Isolation mechanism improved in Android
                                                                             • Improved input validation in iOS
 Info                                2% to 3% ↑          11% to 8% ↓         • Crafted libstagefright file in Media server applications in Android
                                                                             • Stack overflow addressed with improved input validation in iOS
 Overflow                            ↔                   0% to 1% ↑          • Small allocated stacks in iOS
 Bypass +Info                        10% to 0% ↓         4% to 0% ↓          • Better encryption mechanisms in Android
                                                                             • Improved checks in iOS
 Priv                                9% to 0% ↓          ↔                   • Better encryption mechanisms in Android
 Overflow Mem. Corr.                 ↔                   0% to 46% ↑         • Jailbreaking, small allocated stacks iOS
 DoS exec code overflow              34% to 0% ↓         39% to 0% ↓         • Improved validation, improved memory management, improved checks in Android and
 Mem. Corr.                                                                  iOS
 DoS exec code Mem. Corr.            1% to 0% ↓          7% to 0% ↓          • Improved input validation, improved memory management in Android and iOS
↑ Increase, ↓ Decrease, ↔ Constant.
Table 5                                                                                     Table 7
Access levels of Android and iOS vulnerabilities.                                           Impact score on confidentiality.
 OS                  Local (%)           Local network (%)              Remote (%)           Complexity             Complete (%)             None (%)           Partial (%)
 Android             25                  2                              73                   Android                48                       11                 40
 iOS                 14                  1                              85                   iOS                    22                       18                 60
Table 6                                                                                     Table 8
Access complexity of Android and iOS vulnerabilities.                                       Impact score on integrity.
 OS                       High (%)             Low (%)                 Medium (%)            Complexity             Complete (%)             None (%)           Partial (%)
 Android                  5                    47                      49                    Android                46                       31                 22
 iOS                      2                    26                      71                    iOS                    22                       27                 51
Table 10
Malware description.
 Year      Targeted      Malware             Malware        Description
           OS                                type
 2015      Android       Acecard             Trojan         A type of Trojan Banker, which steals banking information of the user
 2015      Android       AdDown              Adware         Shows ads to infected users, collects personal data on its victims, and secretly installs apps without the
                                                            user’s knowledge
 2015      iOS           XcodeGhost          Trojan         Collects information on the device and upload it to the C2 servers
 2015      iOS           YiSpecter           Adware         Attacks both jailbroken and non-jailbroken iOS devices through unique and harmful malicious behaviors
 2016      Android       Triada              Backdoor       Evades anti-virus by executing DroidPlugin open-source sandbox to hide malicious Android application
                                                            package (APK) plugins in its asset directory
 2016      Android       Switcher            Trojan         It hacks the WiFi router, when the device is connected to a WiFi network
 2016      iOS           AceDeceiver         Trojan         AceDeceiver manages to install itself without any enterprise certificate at all. It does so by exploiting
                                                            design flaws in Apple’s DRM mechanism
 2016      iOS           Fusob               Ransomware     Demands ransom for illegal actions
 2017      Android       ToastAmigo          Backdoor       Installs additional malware on an affected device using the toast overlay attack
 2017      Android       ViperRAT            Trojan         Allows the attacker to access device data, SMS, WhatsApp database and encryption keys, browsing and
                                                            search histories, documents and archives found in storage, and photos taken.
 2017      iOS           Safari JavaScript   Ransomware     Blocks the Safari browser on iOS until the victim pays the attacker money in the form of an iTunes
                         pop-up scareware                   Gift Card
 2018      Android       BianLian            Trojan         Requests permissions that allows it to read, send, and receive text messages; monitor and make calls;
                                                            insert overlays on banking applications; lock the device screen
 2018      Android       Emotet              Trojan         Persuades users to click the malicious files by using tempting language about ‘‘Your Invoice’’, ‘‘Payment
                                                            Details’’, or possibly an upcoming shipment from well-known parcel companies.
 2018      iOS           Pegasus             Spyware        Pegasus has multiple spying modules such as taking screenshots, recording calls, accessing messenger
                                                            applications, keylogging and exfiltrating browser history
 2018      iOS           Roaming Mantis      Trojan         Targets iOS devices with phishing attacks, and desktops and laptops with the Coinhive cryptomining
                                                            script
 2019      Android       Cerberus            Trojan         Intercepts the calls, forwards the SMSs, locks the device and key logger
 2019      Android       XHelper             Trojan         Displays popup ads, which redirects users to the Google play store and prompts users to install other
                                                            apps, indicating that the actors behind the Trojan make profits off pay-per-install commissions
                                                                                   11
S. Garg and N. Baliyan                                                                                      Computer Science Review 40 (2021) 100372
the mapping of the malware with the known vulnerabilities auto-           Table 11
                                                                          Future research directions.
matically. The aim is that in near future if a new Android malware
                                                                           Issues with Android (vs. iOS)               Category              Severity
variant appears, developers can know at prior which vulnerability
                                                                           Provides infrequent updates for OS          Device integrity      High
it will exploit and appropriate measures can be taken timely and
                                                                           Triggers auto erase under illegal action    Device integrity      Medium
in a cost effective manner.                                                Provides low level face recognition; gets   Authentication        High
    Major challenges in this domain and forthcoming research               tricked by photo
                                                                           Allows third party apps                     Application privacy   High
directions are divided into main buckets — device integrity, au-
                                                                           Takes permissions from user; iOS itself     Application privacy   Medium
thentication mechanism, application privacy, and source code and           does thorough check
hardware security along with the severity level of each problem,           Allows app Interaction in sandbox           Application privacy   Medium
                                                                           environment
as discussed in Table 11.
                                                                           Exempts application provenance              Application privacy   Low
    Apart from the aforementioned challenges, other problems               Allows distribution of source code          Source code           High
which prevail in Android security domain is the unavailability             Lacks control over hardware security        Hardware security     High
                                                                           Provides number of device variants and OS   Hardware security     Low
of comprehensive malware dataset. There is a need of standard,
                                                                           versions
structured and updated datasets since the Android malware are              Leverages multiple device manufacturers;    Hardware security     Medium
increasing at a striking rate. Existing malware datasets are not           affects standardization and control
                                                                           Prevailing code coverage problem            Source code           Medium
comprehensive, thereby lacking up to date information. Such
                                                                           Evades zero-day attack detection            Application privacy   High
datasets can be helpful to perform malware detection analysis in           Tampers reverse engineering techniques      Application privacy   Medium
an efficient manner. Also, large data volume poses difficulty to
develop robust and efficient detection techniques. ML approaches
have proved to be fruitful as compare to conventional malware             9. Conclusion
detection techniques, however, Machine learning (ML) algorithms
fail while dealing with large data volume. A shift from ML to Deep
Learning (DL) is required to handle issues like large data volume           Android and iOS being the most popular among all the smart-
and high false positive rate.                                             phone platforms, also attracts large number of attackers with
                                                                     12
S. Garg and N. Baliyan                                                                                                          Computer Science Review 40 (2021) 100372
malicious intentions. The pragmatic approach used for compar-                             [17] J. Wang, Introduction to Computing Applications in Forestry and Natural
ing Android and iOS helps to understand that Android is more                                   Resource Management, CRC Press, 2017.
                                                                                          [18] T.M. Grønli, J. Hansen, G. Ghinea, M. Younas, Mobile application platform
susceptible to security breaches and malware attacks. There-
                                                                                               heterogeneity: Android vs Windows phone vs iOS vs Firefox OS, in: IEEE
fore, in the research domain Android becomes the first choice.                                 28th International Conference on Advanced Information Networking and
The paper also presents forthcoming challenges and research                                    Applications, 2014, pp. 635–641.
directions, which are bucketed in the different categories along                          [19] R. Loftus, M. Baumann, R. van Galen, R. de Vries, Android 7 file based
with the severity of each problem. These problems do not seem                                  encryption and the attacks against it, 2017.
                                                                                          [20] S. Diaz, IOS security - iOS 11, 2020, Available from: https://www.readkong.
to be solvable in next coming years and continue to stay for                                   com/page/ios-security-ios-11-january-2018-8964944.
long. The major buckets are device integrity, application privacy,                        [21] L. Davi, A. Dmitrienko, A.R. Sadeghi, M. Winandy, Privilege escalation
hardware security, source code and authentication mechanisms,                                  attacks on android, in: Information Security, Springer, 2011, pp. 346–360.
which should be focused by the researchers and academicians.                              [22] A.J. Bhatt, C. Gupta, Comparison of static and dynamic analyzer tools for
                                                                                               iOS applications, Wirel. Pers. Commun. 96 (3) (2017) 4013–4046.
These research directions can prove to be fruitful in smoothening
                                                                                          [23] T. Werthmann, R. Hund, L. Davi, A.R. Sadeghi, T. Holz, PSiOS: bring
the Android security domain, where application developers will                                 your own privacy & security to iOS devices, in: Proceedings of the 8th
be able to develop a more accurate, efficient, robust and scalable                             ACM SIGSAC Symposium on Information, Computer and Communications
mechanisms.                                                                                    Security, ACM, 2013, pp. 13–24.
                                                                                          [24] T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryp-
                                                                                               tion: Information leakage through unencrypted metadata, in: Proceedings
Declaration of competing interest                                                              of the 14th International Conference on Availability, Reliability and
                                                                                               Security, 2019, pp. 1–7.
    The authors declare that they have no known competing finan-                          [25] Y. Shen, H. Wang, Enhancing data security of iOS client by encryption
cial interests or personal relationships that could have appeared                              algorithm, in: IEEE 2nd Advanced Information Technology, Electronic and
                                                                                               Automation Control Conference (IAEAC), 2017, pp. 366–370.
to influence the work reported in this paper.
                                                                                          [26] J.K. MacDuffie, P.A. Morreale, Comparing android app permissions, in:
                                                                                               International Conference of Design, User Experience, and Usability, 2016,
References                                                                                     pp. 57–64.
                                                                                          [27] M. Lutaaya, Rethinking app permissions on iOS, in: Extended Abstracts of
 [1] S. O’Dea, Number of mobile phone users worldwide from 2016 to 2021 (in                    the 2018 CHI Conference on Human Factors in Computing Systems, 2018,
     billions), 2020, Available from: https://www.statista.com/statistics/330695/              pp. 1–6.
     number-of-smartphone-users-worldwide/.                                               [28] H. Pieterse, M. Olivier, R. van Heerden, Detecting manipulated smartphone
 [2] Statcounter GlobalStats, Mobile operating system market share worldwide,                  data on Android and iOS devices, in: International Information Security
     2020, Available from: https://gs.statcounter.com/os-market-share/mobile/                  Conference, 2018, pp. 89–103.
     worldwide.                                                                           [29] M. Opoku, J.G. Davis, P. Nimbe, Security evaluation of the smartphone
 [3] Liam Tung, Bigger than Windows, bigger than iOS: Google now                               platforms: A case study with Android, iOS and Windows phones, Asian
     has 2.5 billion active Android devices, 2020, Available from:                             J. Math. Comput. Res. (2016) 234–259.
     https://www.zdnet.com/article/bigger-than-windows-bigger-than-ios-                   [30] R. Kumar, R.R. Goyal, On cloud security requirements, threats, vulner-
     google-now-has-2-5-billion-active-android-devices-after-10-years/.                        abilities and countermeasures: A survey, Comp. Sci. Rev. 33 (2019)
 [4] J. Clement, Mobile app downloads worldwide from 2018 to 2024, by store,                   1–48.
     2020, Available from: https://www.statista.com/statistics/1010716/apple-             [31] S. Garg, R.K. Singh, A.K. Mohapatra, Analysis of software vulnerability
     app-store-google-play-app-downloads-forecast/.                                            classification based on different technical parameters, Inform. Secur. J.:
 [5] S.F. Hidhaya, A. Geetha, Detection of vulnerabilities caused by webview ex-               Glob. Perspect. 28 (2019) 1–19.
     ploitation in smartphone, in: Ninth International Conference on Advanced             [32] CVE details, 2020, Available from: https://www.cvedetails.com/.
     Computing (ICoAC), 2017, pp. 357–364.                                                [33] I. Popescu, The influence of vulnerabilities on the information systems and
 [6] L. Zhang, Smartphone App Security: Vulnerabilities and Implementa-                        methods of prevention, Int. J. Inform. Secur. Cybercrime (IJISC) 7 (2) (2018)
     tions Doctoral dissertation, 2018.                                                        25–32.
 [7] M.T. Ahvanooey, Q. Li, M. Rabbani, A.R. Rajput, A survey on smart-                   [34] S.S. Chakkaravarthy, D. Sangeetha, V. Vaidehi, A survey on malware
     phones security: Software vulnerabilities, malware, and attacks, 2020,                    analysis and mitigation techniques, Comp. Sci. Rev. 32 (2019) 1–23.
     arXiv preprint arXiv:2001.09406.                                                     [35] P. Yan, Z. Yan, A survey on dynamic mobile malware detection, Softw.
 [8] M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S. Albahri,             Qual. J. 26 (3) (2018) 891–919.
     M. Alaa, Comprehensive review and analysis of anti-malware apps for                  [36] A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no
     smartphones, Telecommun. Syst. 72 (2) (2019) 285–337.                                     more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6)
 [9] B. Shrestha, D. Ma, Y. Zhu, H. Li, N. Saxena, Tap-wave-rub: Lightweight                   pp. 719–738.
     human interaction approach to curb emerging smartphone malware, IEEE                 [37] A. Qamar, A. Karim, V. Chang, Mobile malware attacks: Review, taxonomy
     Trans. Inf. Forensics Secur. 10 (2015) 2270–2283.                                         & future directions, Future Gener. Comput. Syst. 97 (2019) 887–909.
[10] S. Lee, D.Y. Ju, Assessment of malicious applications using permissions and          [38] F. Pierazzi, G. Mezzour, Q. Han, M. Colajanni, V.S. Subrahmanian, A data-
     enhanced user interfaces on android, in: IEEE International Conference on                 driven characterization of modern Android Spyware, ACM Trans. Manage.
     Intelligence and Security Informatics (ISI), 2013, p. 270.                                Inform. Syst. (TMIS) 11 (1) (2020) 1–38.
[11] B. Rashidi, C.J. Fung, A survey of Android security threats and defenses,            [39] J. Lim, J.H. Yi, Structural analysis of packing schemes for extracting hidden
     JoWUA 6 (3) (2015) 3–35.                                                                  codes in mobile malware, EURASIP J. Wireless Commun. Networking 1
[12] T. Cho, S.H. Seo, A strengthened Android signature management method,                     (2016) 221.
     KSII Trans. Internet Inform. Syst. 9 (3) (2015).                                     [40] J. Clement, Development of new Android malware worldwide from 2016
[13] C. Szongott, B. Henne, M. Smith, Evaluating the threat of epidemic mobile                 to 2019 (in millions), 2020, Available from: https://www.statista.com/
     malware, in: IEEE 8th International Conference on Wireless and Mobile                     statistics/680705/global-android-malware-volume/.
     Computing, Networking and Communications (WiMob), 2012, pp. 443–450.                 [41] S. Garg, N. Baliyan, A novel parallel classifier scheme for vulnerability
[14] P. Teufl, T. Zefferer, C. Stromberger, Mobile device encryption systems, in:              detection in android, Comput. Electr. Eng. 77 (2019) 12–26.
     IFIP International Information Security Conference, 2013, pp. 203–216.               [42] S. Garg, N. Baliyan, Data on vulnerability detection in android, Data Brief
[15] S. Salerno, A. Sanzgiri, S. Upadhyaya, Exploration of attacks on current                  22 (2019) 1081–1087.
     generation smartphones, Procedia Comput. Sci. 5 (2011) 546–553.                      [43] S. Garg, N. Baliyan, Android malware classification using ensemble classi-
[16] J. Zdziarski, Identifying back doors attack points and surveillance                       fiers, in: Cloud Security: Concepts, Applications and Perspectives, Chapter
     mechanisms in iOS devices, Digit. Invest. 11 (2014) 3–19.                                 13, CRC Press, 2021, In Press.
13