Xuxian Jiang, the mastermind behind the Android Malware Genome Project, said defenses against this malware are hampered by the lack of efficient access to samples, as well as a limited understanding of the various malware families targeting Android. The goal is to establish a better way of sharing malware samples and analysis, and developing better tools to fight it, he said.
"Basically, at this stage we want to open up first our current collection of Android malware samples and make them available to the research community. The purpose is to engage the research community to better our understanding of mobile threats and develop effective solutions against them," says Jiang, who is assistant professor of computer science at N.C. State. Jiang says his team is still in the process of fully mapping the genomes of Android malware families.
N.C. State has sent its malware research and data to several universities, research labs, and vendors thus far via the new Android Malware Genome Project, including Purdue University; University of Michigan; University of California, Riverside; Northwestern University; Fudan University in China; Texas A&M University; University of Louisiana at Lafayette; Beijing Jiaotong University in China; University of California, Berkeley; University of Texas at Dallas; Vienna University of Technology, Austria; VU University Amsterdam, The Netherlands; University of Washington; NQ Mobile, USA/China; and Mobile Defense.
To avoid abuse of the data, Jiang says N.C. State won't merely post the data online without vetting users. "Instead, we will have some sort of authentication mechanism in place to verify user identity or require necessary justification, if necessary," he said.
Mobile security experts long have lobbied for learning from mistakes in the PC malware world, and taking a different approach to detect and quash mobile malware. Tyler Shields, senior security researcher at Veracode, says the N.C. State project demonstrates how academia is trying to avoid the mistakes of the past with malware research.
Employees and their browsers might be the weak link in your security plan. The new, all-digital Endpoint Insecurity Dark Reading supplement shows how to strengthen them. (Free registration required.)