Google's Android Malware Detection Falls Short
By Thomas Claburn
InformationWeek
Sophos, a computer security company, asserts that there is a growing malware problem for Android devices and that Android devices are less safe than iOS or Windows Phone devices. The FBI has noticed too, issuing a warning in October about risks facing Android users.
Google appears to be aware that Android needs better security. In September, it bought VirusTotal.com, a company that measures the effectiveness of malware detection engines. And Android 4.2 "Jelly Bean" includes a new app verification service to help identify potentially malicious apps.
[ Will Apple products be more secure if they are made in the United States? Read Apple Mac To Be Made In USA. ]
But a study published recently by Xuxian Jiang, associate professor of computer science at North Carolina State University, finds that Google's app verification service can identify only 15% to 20% of known Android malware.
The study also found that existing third-party security software for Android -- from Avast, AVG, TrendMicro, Symantec, BitDefender, ClamAV, F-Secure, Fortinet, Kaspersky and Kingsoft -- performed significantly better at detecting malware, with accuracy ranging from 51% to 100%.
In his study, Jiang says that the app verification service's reliance on SHA1 cryptographic hashes to identify malware files "is fragile and can be easily bypassed." Malware authors can simply repackage or alter their files to create different hash values, a fact that had forced the creators of computer security products to look beyond signature-based solutions.
Jiang suggests that Google's cloud-based approach to security could be augmented by more on-device security capabilities. In an email, he said the app verification service can be considered a move toward enhancing client-side security, but the "signature-based approach (adopted in most of current AV systems) can never keep up with the speed at which malware is created and evolved."
He recommends that Google look into collecting more information about apps, inasmuch as privacy considerations allow. He also says Google should "beef up the app verification service or integrate with more advanced server support," through integration with Bouncer, an app scanning mechanism that Google introduced in February, or Google's newly acquired VirusTotal.com.
Google didn't immediately respond to a request for comment.
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
Join Cloud Connect for a free webcast with "Cloudonomics" author Joe Weinman. Cloudonomics is a new way to discuss the benefits of private clouds. Many have focused on the cost reduction possibilities while others have focused on business agility. However, private clouds can play a strategic role, as well. The Cloudonomics webcast happens Dec. 12. (Free registration required.)
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS