The popularity of the Android platform, combined with the openness that it represents, has created model that allows developers of all shapes and sizes to create unique works. Yet, this same openness has allowed criminals to create works with malicious intent. Thus, a North Carolina State University researcher has sat out to map the Android Malware Genome in an effort to spread information and combat the malicious side of Android development.
The brainchild of Xuxian Jiang, the Android Malware Genome Project has already collected 1,200 unique examples of Android-based malware. The project itself has a simple mission – it exists to facilitate security research, and ultimately promote stronger defenses to consumers using the platform.
Jang, who is also Director of NQ Mobile’s U.S. Security Research Center, announced the project during the IEEE Symposium on Security and Privacy, held this week in San Francisco.
“Our defense capability is largely constrained by the limited understanding of these emerging mobile malware and the lack of timely access to related samples. Our research community needs to do a better job of sharing data if we want to develop timely, next-generation mobile security solutions,” Jing said.
At this point, the research has shown that at worst, the current anti-Malware solutions for Android are only detecting about 20% of the existing threats. The Android Malware Genome Project seeks to examine the current installation methods, activation mechanisms, and malicious payloads.
As things stand, the initial results show a clear need to develop stronger defenses for the platform overall. Researchers interested in obtaining the current dataset will need to meet certain criteria. The details are posted here.
The NCSU project closely mirrors a similar effort initiated by Lookout in 2010. The project, dubbed “App Genome Project,” had scanned nearly 100,000 applications at the time of its announcement, but has since grown to analyze more than 500,000 iOS and Android Applications. More information is here.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
