General characteristics of Android browsers with focus on security and privacy features

  • Petar Čisar
  • Sanja Maravic Cisar Subotica Tech-College of Applied Sciences
  • Igor Fürstner
Keywords: Android browser, security, adblock, tracking, encryption, benchmark test


Satisfactory level of security in the use of the Internet in mobile devices depends on several factors. One of them is safe browsing. A key factor in providing secure browsing is the application of a browser with the appropriate methods applied: clearing cookies, cache and history, ability of incognito browsing, using of whitelists and encryptions and others. This paper presents an overview of the various security and privacy features used in the most frequently used Android browsers. Also, in the case of several browsers and types of mobile devices, the use of benchmark tests is shown. Bearing in mind the differences, when choosing a browser, special attention should be paid to the applied security and privacy features.


[1] Urbas, G., & Krone, T. (2006). Mobile and wireless technologies: security and risk factors, Trends & Issues in Crime and Criminal Justice, No. 329, Australian Institute of Criminology. Available from: [accessed May 18 2019].
[2] Androulidakis, I. (2016). Mobile Phone Security and Forensics: A Practical Approach, Springer. Doi: 10.1007/978-3-319-29742-2
[3] Doherty, J. (2015). Wireless and Mobile Device Security, Jones & Bartlett Learning, 1 edition
[4] Bergman, N., Stanfield, M., Rouse, J., & Scramblay, J. (2013). Hacking Exposed Mobile: Security Secrets & Solutions, 1st Edition, McGraw-Hill Education.
[5] Amrutkar, C., Singh, K., Verma, A., & Traynor, P. (2012). VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security, International Conference on Information Systems Security ICISS 2012, pp. 16-34
[6] Amrutkar, C., van Oorschot, P.C., & Traynor, P. (2011). An Empirical Evaluation of Security Indicators in Mobile Web Browsers. Georgia Tech Technical Report GT-CS-11-10
[7] Terada, T. (2014). Attacking Android browsers via intent scheme URLs, Whitepaper, Mitsui Bussan Secure Directions, Inc. Available from: [accessed May 18 2019].
[8] Virvilis, N., Myolonas, A., Tsalis, N., & Gritzalis, D. (2015). Security Busters: Web Browser security vs. rogue sites, Computers & Security, No. 52, Available from: [accessed May 18 2019].
[15] LLC
[29] Gadget Hacks,
Critical Infrastructure and Cyber Protection (Kritikus infrastruktúra)