Rooting of Android Devices and Customize
Rooting of Android Devices and Customize
Abstract-- When we use a mobile device which runs Android, Microsoft Windows, and Apple devices which run the iOS. But
we usually look for the basic features such as call, texting, when it comes to iOS (Apple devices), the term used for the
gaming, internet browsing, camera and music. However process of rooting is JAILBREAKING. However, these
Android devices can be made more powerful and its power concepts differ. Jailbreaking does not allow for OS
can be utilized in a larger scale once it has been rooted. replacements, instead it bypasses several Apple prohibitions for
the end user.
Keywords-- Root, Rooting, Android, Recovery, Bootloader,
Overclock. Rooting : A problem for Manufacturers?
Many number of android device manufacturers have tried to
I. Introduction implement severe security/protection features in their devices
This paper gives an analysis of a process called as “Rooting” in order to make them “unrootable”. But unfortunately those
which is not known to a large portion of the general public who devices were still managed to be rooted by the users in some
use android devices and are yet unknown to the possibilities of way. There may not be any features available to root the
numerous experiments which can be done with this open recently launched devices but usually it’s available in a couple
source operating system. When compared to the total number of months once a developer of modified operating systems gets
of people who use android devices on a regular basis, only a his/her hands on the device and performs various experiments
few know about the true potential of “Rooting” and how on it. In the year 2011, Motorola, LG Electronics, and HTC
countless experiments have already been performed by many added security features in the hardware level to prevent users
hard-core programmers and how they have made everything from rooting the stock Android OS which came with the
they worked on available to the general public, for FREE. devices as a retail package. The Motorola Droid X has a
security boot-loader that boots the phone into “recovery mode”
II.Methods and Methodology if the user loads an unsigned, i.e., modified Android OS that
What is Rooting? hasn’t been approved by the manufacturer. But, the developers
Android rooting is the process of allowing the users of devices have managed to come up with a way of upgrading the “boot-
running Android mobile operating system to attain privileged loader” itself into a different version and then moving on with
control (known as “root access”) within Android’s sub-system. the installation of unsigned operating systems without any
problems.
Goals
Rooting is often performed with the goal of overcoming What is Boot-loader?
limitations that carriers and hardware manufacturers put on Boot-loader is a piece of code that runs before any operating
some devices, resulting in the ability to alter or replace system system starts running. Boot-loaders can be used to boot other
applications and settings, run specialized apps that require operating systems. Usually, each operating system has a
administrator-level permissions, or perform other operations specific set of boot-loader codes. Since, it is the first software
that are otherwise inaccessible to a normal Android user. A to run after a system’s power-up or reset, it is highly processor
user who has no technical knowledge about the sub-system of and board specific. Various manufacturers use various kinds of
the operating system might make a few changes unknowingly processors and chipset boards and hence they have specific
which may prove to be fatal to the device. For this very reason boot-loaders for different models of their devices.
perhaps, the manufacturers fix limitations on the access which
a user gets over the device. And many believe that these Android Architecture and Security
limitations are too much and hence rooting was introduced. Android seeks to be the most secured and usable operating
Rooting also facilitates the complete removal and replacement system for mobile phones (smartphones and tablets). Having
of the device’s operating system. the Linux kernel makes it a well secured operating system but
Android is derived from the Linux kernel, and hence, rooting as Android keeps upgrading and becomes more and more
an Android device gives similar access administrative enhanced with added features, it also faces security threats and
permissions as on Linux or any other Unix-like operating these security issues keep growing with time. The stock version
system such as FreeBSD or OS X. of the OS provided by the device manufacturer limits the root
Rooting can not only be performed in Android devices, but access to the users and it is a well thought security threat
also in other devices such as Nokia which used to run Symbian prevention scheme. If the administrator (the user) itself doesn’t
OS in most of its devices until the recent shift towards get the root access, then the applications installed by the users
which if infected by a malicious file cannot harm the core of
IJSET@2014 Page 553
554 International Journal of Scientific Engineering and Technology (ISSN : 2277-1581)
Volume No.3 Issue No.5, pp : 553-556 1 May 2014
the Android in the device. As per the architecture, the Linux applications the user decides to install. Any small
kernel consists of the display driver, the camera driver, flash irresponsibility by the user can brick the device and the use
memory driver, Inter Process Communication driver, Keypad might have to go through a long procedure of re-rooting the
driver, Wi-Fi driver, Audio drivers and Power Management. phone and installing a new bootloader and then the operating
The device can be seriously harmed if any of the above system and lose all data in the process.
mentioned drivers get affected. Android applications do consist The users tend to rely on smartphones with sensitive data such
of anti-virus apps which help a lot. But, if the Android device as Bank Account details, contacts and address books,
is rooted, it gives flawless access of the root-files and the documents and media files such as pictures and audio/video
kernel to the user and this means any application installed by data. Losing all the data is always a risk in rooted devices and
the user will get the access to the root files. Under such the manufacturers will take no responsibility as rooting voids
circumstances, the device becomes seriously vulnerable to any warranty applicable to the device.
security threats and the user must be very careful about the
IV. Conclusion
References
In this paper, we have discussed about the process of Rooting i. Tiwari Mohini, Srivastava Ashish Kumar and Gupta Nitesh
an Android device and we have given an insight of how (19th November,2013) “Review on Android and Smartphone
resourceful and efficient a customized ROM based on Security”.
Androids kernel and firmware can be. Irrespective of some ii. "CyanogenMod supported by Samsung" January 16, 2012
iii. Official Bootloader Unlock Instructions
drawbacks, these custom ROMs prove to be worthy operating iv. The Official AT&T FAQs
systems and have the potential to perform really well if they v. Does rooting your device (e.g. an Android phone) and
get the proper support at the right time. If the mobile replacing its operating system with something else void your
manufacturers at some point consider combining their statutory warranty, if you are a consumer? (
development teams and the developers of the customized fsfe.org/freesoftware/legal/flashingdevices.en.html )
ROMs, they can produce multiple operating systems that vi. "Is It Illegal To Unlock a Phone? The Situation is
would suit a wide segment of users who would prefer various Better - and Worse - Than You Think | Electronic Frontier
operating systems based on their priorities. Foundation". (https://www.eff.org/is-it-illegal-to-unlock-a-phone)
vii. Wikipedia (Android Rooting)
viii. “Motorola Offers Unlocked Bootloader Tool”
Acknowledgement (techcrunch.com/2011/10/24/)
ix. “MIUI is popular” (androidandme.com)
The author wishes to acknowledge Vel Tech Multitech Dr. x. www.miui.com/en
Rangarajan Dr. Sakunthala Engineering College (Affiliated to xi. “What you can do after rooting your Android
Anna University) for providing grateful support and necessary device”, Gaurav Gahlyan (www.droidiser.com/2012/11/what-after-
rooting-apps-tips.html)
help for the work that has been done in this paper.
xii. Source.android.com