
Adaptive Intelligent Anti-Theft Framework to Enhance the Protection of Modern Android Devices | IJET â Volume 12 Issue 2 | IJET-V12I2P99

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access ⢠Peer Reviewed ⢠High Citation & Impact Factor ⢠ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: Lokesh R G, Divya A, Irin Gilda T , Francis Arockia Jaison X, Micheal Simon S, Wilson Paul
DOI: https://doi.org/{{doi}} ⢠PDF: Download
Abstract
The rapid increase in mobile device theft has become a significant threat to user privacy and data security. Conventional anti-theft
mechanisms often fail when a smartphone is physically stolen, as attackers can easily remove SIM cards, disable network connectivity, or modify system and location settings. These vulnerabilities highlight the need for a security framework capable of maintaining protection even when the device is actively compromised. This research proposes a secure architecture designed to safeguard sensitive data on enterprise mobile devices in the event of theft or unauthorized access. The proposed solution integrates end-userâfocused Mobile Device Management (MDM) principles with deep Android system integration using Flutter Method Channels, enabling enhanced low-level security controls and monitoring capabilities. The architecture introduces the UDB system framework, which supports secure device management and data protection even under adverse conditions. Furthermore, the SecureFind system employs a two-tier command-and-control model that enables administrators to enforce security policies and execute protective actions based on telemetry-driven device monitoring. This approach ensures continuous device integrity, remote management, and protection of sensitive information such as authentication logs and credentials. By combining advanced device management strategies with secure architectural design, the proposed system provides a robust solution for mitigating the risks associated with mobile device theft. Overall, this work contributes a comprehensive framework for maintaining device trustworthiness and safeguarding personal and enterprise data in an increasingly connected mobile environment.
Keywords
Android Security System, Anti-Tampering Protection, Device Administrator API, Firebase SMS Services Mobile Device Management (MDM), Supabase.
Conclusion
This paper presented the system architecture and implementation strategy for SecureFind, an advanced Android anti-theft application. By applying principles of Enterprise MDM architecture and coupling the cross-platform efficiency of Flutter with the privileged access of the Native Android DPM API, we successfully developed a system capable of executing critical security actions remotely and instantly. The implemented featuresâremote lock, quick access bar restriction, and the dual-channel recovery mechanismâprovide a robust defense against common theft attempts. Future work will focus on integrating hardware-backed security features and exploring advanced machine learning algorithms for automatic suspicious activity detection.
The implementation of SecureFind, leveraging the tight integration between Flutter, Supabase Realtime, and the Android DPM, successfully enhances mobile anti-theft protection far beyond conventional methods. By structuring the application based on the MDM client-server model, we achieved two critical results: uninterrupted traceability and proactive data defense. The utilization of the dual-channel command system (FCM/Realtime and SMS fallback) effectively mitigates the primary theft vector: disabling network services. When tested, the system successfully regained network connectivity and location reporting in over 95% of simulated offline theft scenarios. Furthermore, the Lock Task Mode integration confirms that the device remains in a secure, non-dismissible state, denying the thief the ability to compromise system settings or access sensitive notifications. This enhanced theft protection validates the necessity of deep native integration for consumer-grade security applications, setting a new benchmark for device recovery and ensuring the integrity of stored data.
References
[1]R. Wathsala, M. Silva, R. Kodikara, S. Ekanayake, N. Gamage, and P. Gunathilake, âTowards a Smart Home: An Intelligent Approach to Environment Monitoring and Anti-Theft Alarming,â Proc. 12th Int. Conf. Awareness Science and Technology (iCAST), Nov. 2023, pp. 253â258.
[2]J. Zhang, L. Xie, L. He, Z. Wang, and J. Chen, âEnhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication,â Computers & Security, vol. 148, p. 104176, 2025.
[3]V. Kumar, K. Gaur, R. Singh, and P. Bajaj, âAndroid Based Instant Messaging Application Using Firebase,â Annals of the Romanian Society for Cell Biology, vol. 25, no. 7, pp. 71â77, 2021.
[4]A. Z. Ayezabu, âSupabase vs Firebase: Evaluation of performance and development of Progressive Web Apps,â 2022.
[5]R. Agarwal and S. Bilokhatniuk, âAndroid authentication and device administration API,â Journal of Computing Sciences in Colleges, vol. 27, no. 5, pp. 187â195, 2012.
[6]S. Mohammad and S. Pourdavar, âPenetration test: A case study on remote command execution security hole,â Proc. 5th Int. Conf. Digital Information Management (ICDIM), Jul. 2010, pp. 412â416.
[7]A. Liu, Y. Zhang, S. Luo, and J. Miao, âDual-channel global closed-loop supply chain network optimization based on random demand and recovery rate,â Int. J. Environmental Research and Public Health, vol. 17, no. 23, p. 8768, 2020.
[8]A. Heryandi, âDeveloping application programming interface (API) for student academic activity monitoring using Firebase cloud messaging (FCM),â IOP Conf. Series: Materials Science and Engineering, vol. 407, no. 1, p. 012149, 2018.
[9]C. Xu, X. Sun, B. Li, X. Lu, and H. Guo, âMULAPI:
Improving API method recommendation with API usage location,â Journal of Systems and Software, vol. 142, pp. 195â205, 2018.
[10]N. Elenkov, Android Security Internals: An In-Depth Guide to Androidâs Security Architecture. San Francisco, CA, USA: No Starch Press, 2014.
[11]
M. O. Alassafi and S. H. Hasan, âDual-Channel Attention Deep Bidirectional Long Short Term Memory for Enhanced Malware Detection and Risk Mitigation,â Computer Modeling in Engineering & Sciences (CMES), vol. 144, no. 2, 2025.
[12]PostgreSQL Global Development Group, PostgreSQL, 1996. [Online]. Available: http://www.postgresql.org/
[13]M. C. Dorf, âFallback Law,â Columbia Law Review, vol. 107,
p. 303, 2007.
[14]A. Kandel and G. Langholz, Hybrid Architectures for Intelligent Systems. Boca Raton, FL, USA: CRC Press, 2020.
[15]M. Wyszomirski and D. Gotlib, âA unified database solution to process BIM and GIS data,â Applied Sciences, vol. 10, no. 23,
p. 8518, 2020.
[16]V. Mutiawani, S. Rahmany, and T. F. Abidin, âAnti-theft vehicle monitoring and tracking android application using Firebase as web service,â Proc. Int. Conf. Electrical Engineering and Informatics (ICELTICs), 2018, pp. 72â77.
[17]L. Simon and R. Anderson, âSecurity analysis of consumer-grade anti-theft solutions provided by android mobile anti-virus apps,â Proc. 4th Mobile Security Technologies Workshop (MoST), May 2015.
[18]P. M. Reehan, R. Horatti, V. V. Chandra, N. Kotha, and A. Ajil, âAnti-theft application for Android smartphone,â International Journal of Advanced Research in Computer Science, vol. 11, 2020.
[19]D. Zou and M. Y. Darus, âA Study of UI Construction in Android and Flutter: Comparative & Analysis,â 2024.
[20]C. Liu, X. Ji, J. Wu, and X. Qin, âA proactive defense mechanism for mobile communication user data,â Science China Information Sciences, vol. 61, no. 10, p. 109303, 2018.
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, â{{title}},â International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
