Android Operating System, by Open Handset Alliance, prominently led by Google is dominating the share of smart phones. Mobile applications like banking, e-shopping, business apps used on these devices have become foundational tool for today’s workforce. However the Smartphone users are under continuous threat of exposure and misuse of their personal information due to rapid growth of malware for android which significantly exceeds that of other platforms. Android being open platform supports the development of applications. Now a day’s one can publish an app after registration as a developer for USD25. Due to its availability to all android users, the android market is the main channel of malware distribution. Along with its growth, the importance of security has also risen. A proportional increase in the number of vulnerabilities is also happening to the extent that there are limited numbers of security applications available to protect these devices. Among the security apps many antivirus which work on the application layer are present in the market which claims the security. However, the efficacies of these applications have not been empirically established. After studying the shortcomings and demerits of the available solutions, an enhanced security solution for android application assessment at the operating system level is suggested. The solution customizes the android operating system mainly the package manager which holds the notification of the activities which takes place on the device. The package manager is updated to receive the intent passed by the verification agent activity. An application is built which is hooked to the package manager which checks across the database signatures for the malwares and blocks the installation process of the android application on the system. Altogether a new android system image is compiled and tested across the known set of malwares. Unlike antivirus, this check takes place before the process of installation due to which, we are able to mitigate attacks caused by malwares on android smart phones by variety of applications.
 Fraunhofer AISEC, Android OS Security: Risks and Limitations, A Practical Evaluation Version 1.0, by: Rafael Fedler, Christian Banse, Christoph Kraub and Volker Fusenig.
 University of California ,Berkeley, Android Permissions Demystied, by: CCS11, October 1721, 2011, Chicago, Illionois USA Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner apf, emc, sch, dawnsong, daw@ cs.berkeley.edu
 Package Manager In Depth, In Depth: Android Package Manager and Package installer, http://java.dzone.com/articles/depth-android-package-manager
 Mobile Security, Identifying the Mobile Security Stack, http://blog.veracode.com/2011/03/identifying-the-mobile-security-stack/
 Reference Architecture, Mobile Security Reference Architecture, by CIO Council and US Department of HomeLAnd Security May 2013, https://cio.gov/wpcontent/uploads/2013/05/Mobile-SecurityReference-Architecture.pdf
 2013 IEEE, An AntiVirus API for Android Malware Recognition, by Rafael Fedler, Marcel Kulicke and Julian AISEC Garching near Munich, Germany rafel,firstname.lastname@example.org http://ieeexplore.ieee.org(PISNumber3A6703677)
 Review August 2013, AV-Comparatives Mobile Security, http://www.av-comparatives.org/wp-content/uploads/2013/08/avc_mob_ 201308_en.pdf
 Permission, Android Development Guide, http://developer.android.com/guide/topics/security/permissionas.html
 Permission Element, Android development Guide, http://developer.android.com/guide/topics/manifest/permission-element.h tml
 Systems Internet Infrastructure Security Laboratory. Department of Computer Science and Engineering. The Pennsylvania State University, A Study of Android Application Security, by William Enck, Damien Octeau, Patrick McDaniel and Swarat Chaudhari http://dl.acm.org/citation.cfm?id=2028088
 Symposium on Usable Privacy and Security (SOUPS) 2012, July 11-13,2012, Washington, DC, USA, Android Permissions: User Attention, Comprehension and Behavior by: Adrienne Porter Flet, Elizabeth Hay, Serge Egelman, Ariel Haneyy, Erika Chin, David Wagner Computer Science Department School of Information. University of California, Berkeley
 Smart Devices, Ubiquitous Computing Smart Devices, Environments and Interactions by: Stefan Poslad Queen Mary, University of London, UK
 J.Burns. Exploraory Android Surgery (talk slides), Black Hat Technical Security Conference USA, May 2009. http://www.blackhat.com/html/bhusa-09/bhusa-09-archives.html
 NIST, Descriptions of SHA-1 http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA1.pdf
 Gartner research Smartphone sales operating system http://www.gartner.com/newsroom/id/2665715