Google's Android Malware Detection Falls Short - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
News
12/10/2012
02:03 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google's Android Malware Detection Falls Short

Google's app verification service, introduced in Android 4.2, catches only a fifth of malware samples at best, a recent study reports.

10 Best Business Tools In Google+
10 Best Business Tools In Google+
(click image for larger view and for slideshow)
Android appears to be on a trajectory to become the Windows of mobile operating systems, but there's a downside to ubiquity. Rising market share means increasing attention from malware authors.

Sophos, a computer security company, asserts that there is a growing malware problem for Android devices and that Android devices are less safe than iOS or Windows Phone devices. The FBI has noticed too, issuing a warning in October about risks facing Android users.

Google appears to be aware that Android needs better security. In September, it bought VirusTotal.com, a company that measures the effectiveness of malware detection engines. And Android 4.2 "Jelly Bean" includes a new app verification service to help identify potentially malicious apps.

[ Will Apple products be more secure if they are made in the United States? Read Apple Mac To Be Made In USA. ]

But a study published recently by Xuxian Jiang, associate professor of computer science at North Carolina State University, finds that Google's app verification service can identify only 15% to 20% of known Android malware.

The study also found that existing third-party security software for Android -- from Avast, AVG, TrendMicro, Symantec, BitDefender, ClamAV, F-Secure, Fortinet, Kaspersky and Kingsoft -- performed significantly better at detecting malware, with accuracy ranging from 51% to 100%.

In his study, Jiang says that the app verification service's reliance on SHA1 cryptographic hashes to identify malware files "is fragile and can be easily bypassed." Malware authors can simply repackage or alter their files to create different hash values, a fact that had forced the creators of computer security products to look beyond signature-based solutions.

Jiang suggests that Google's cloud-based approach to security could be augmented by more on-device security capabilities. In an email, he said the app verification service can be considered a move toward enhancing client-side security, but the "signature-based approach (adopted in most of current AV systems) can never keep up with the speed at which malware is created and evolved."

He recommends that Google look into collecting more information about apps, inasmuch as privacy considerations allow. He also says Google should "beef up the app verification service or integrate with more advanced server support," through integration with Bouncer, an app scanning mechanism that Google introduced in February, or Google's newly acquired VirusTotal.com.

Google didn't immediately respond to a request for comment.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
How SolarWinds Changed Cybersecurity Leadership's Priorities
Jessica Davis, Senior Editor, Enterprise Apps,  5/26/2021
Commentary
How CIOs Can Advance Company Sustainability Goals
Lisa Morgan, Freelance Writer,  5/26/2021
Slideshows
IT Skills: Top 10 Programming Languages for 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/21/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll