New York Institute of Technology, USA.
World Journal of Advanced Engineering Technology and Sciences, 2025, 15(03), 1298–1307
Article DOI: 10.30574/wjaets.2025.15.3.1063
Received on 04 May 2025; revised on 07 June 2025; accepted on 09 June 2025
Custom Android ROMs offer enhanced security solutions for enterprise, automotive, and government applications by addressing vulnerabilities inherent in the open-source Android platform. These specialized distributions implement multilayered defensive mechanisms including kernel hardening, permission vulnerability mitigation, and firmware-level zero-trust architecture to combat sophisticated threats. Organizations benefit from reduced attack surfaces, secure deployment options tailored to specific threat models, improved regulatory compliance capabilities, and specialized device security for critical applications. Key innovations include continuous verification of system processes, minimal privilege enforcement, hardware-backed security through trusted execution environments, and runtime integrity monitoring. Despite implementation challenges related to performance overhead, compatibility concerns, and update management, custom ROMs provide significant security advantages by addressing vulnerabilities at their foundation rather than attempting to compensate through application-layer controls. As mobile devices increasingly store sensitive data, these hardened implementations play a crucial role in securing enterprise ecosystems while establishing security patterns that may eventually improve mobile security more broadly.
Zero-Trust Architecture; Kernel-Level Security; Enterprise Mobility; Custom Android ROMs; Supply Chain Validation
Preview Article PDF
Riddhi Patel. Custom ROMs: Enhancing Enterprise-Grade Android Security. World Journal of Advanced Engineering Technology and Sciences, 2025, 15(03), 1298-1307. Article DOI: 10.30574/wjaets.2025.15.3.1063.