Larceny of profound data from apps is at all times measured to be one of the most perilous threats to Android sanctuary. Latest studies show that this can happen even to the apps without obvious implementation weaknesses, through abusing some design flaws of the mobile operating system, e.g., pooled communication channels such as Bluetooth, and side channels such as memory and network data usages. In all these bouts, a malevolent app needs to run abreast with the target (the prey) app (such as messaging, dialer, IoT interface, Bluetooth control service, Internet browser, etc.) to gather its runtime information. Case in point comprise recording cell phone talks from the phone app, gathering medical history data to conclude the ailment condition the user, etc. This runtime information gathering (RIG) menace is convincing and severe, as validated by earlier study and new discoveries, these malicious apps can read entire message threads, can control Bluetooth data transmission, can read, alter and even spoof contact in the device (which can lead to a Social Engineering attack through which device user can fall prey to the name displayed but with attackers contact no. beneath, and can misinterpret or overlook it as a trusted source), can steal passwords and other credentials no matter if they are encrypted or plain format, can control IoT enabled devices which are connected by means of shared communication channel to handset, can disclose user location, can collect phone call recordings and decipher pin from voice sample, etc. To arrange for shield against this new sort of bouts, here is a research of a competent & pioneering system which does not require any modification of existing systems such as on operating system level as well as on applications level. This security system will be capable of securing any app from any category. This new line of security, called AntiRIG Security System, spoils a malevolent app's runtime monitoring challenge by suspending (stopping & putting on hold) all suspicious background processes when the target app (called the prey) is running in the forefront, and restoring the state of all suspicious background processes from the state where they had paused after the prey app ends execution completely and its runtime environment is sanitised. In Android operating system applications are divided in frontground and background instances where any app can be stopped and resume as per need of operating system. AntiRIG Security System takes advantage of this treatment given to applications in android. AntiRIG Security System will also be carefully designed to select the true instants to start and end the shield process, and effectively safeguard itself against malevolent apps. The experimental studies show that this new AntiRIG Security System independent of OS version works well with small influences on the efficacy of legitimate apps and the performance of the OS. Most essentially, the inkling underlying this approach, includes providing protection at the level of application, defen...