Ensuring Privacy in the Android OS by Hooking Methods in Its API


  • Andrei Stefan Constantinescu IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies


Security, Privacy, Application, Android, Xposed, Hooking Functions


The paper presents a mean to ensure security and privacy on Android devices available at the moment by applying a need to know principle for information that the installed applications can access. The presented method requires root access and an Open Source framework that allows hooking functions in the Android system, called Xposed, to be installed.


James C. Sheusi, Android Application Development for Java Programmers, published by Cengage Learning, 2013;

Onur Cinar, Pro Android C++ with the NDK, published by Apress, 2012;

Zigurd Mednieks, L. Dornin, G. B. Meike, M. Nakamura, Programming Android, published by O'Reilly Media, 2012;

Jeff Six, Application Security for the Android Platform: Processes, Permissions, and Other Safeguards, pages 21-51, published by O'Reilly Media, 2011;

Nikolay Elenkov, Android Security Internals: An In-Depth Guide to Android's Security Architecture, pages 13-37, published by No Starch Press, 2014;

Anmol Misra, A. Dubey, Android Security: Attacks and Defenses, pages 3-29, published by CRC Press, 2013;

J. Drake, Z. Lanier, C. Mulliner, P. O. Fora, S. A. Ridley, G. Wicherski, Android Hacker's Handbook, published by John Wiley & Sons, 2014;

***, Security Overview, https://source.android.com/devices/tech/security/overview/index.html;

***, Xposed Framework | Cydia Substrate, http://www.cydiasubstrate.com/id/34058d37-3198-414f-a696-73e97e0a80db/;

***, Gain control over app permissions with Ap Ops, http://www.techrepublic.com/article/gain-control-over-app-permissions-with-ap-ops/;

***, Xposed Development Tutorial, https://github.com/rovo89/XposedBridge/wiki/Development-tutorial;




How to Cite

Constantinescu, A. S. (2015). Ensuring Privacy in the Android OS by Hooking Methods in Its API. Journal of Mobile, Embedded and Distributed Systems, 7(3), 107-112. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Ensuring_Privacy_in_the_Android_OS_by_Hooking_Methods