Researchers Find Ways to Bypass Google’s Android Malware Scanner - hensonkettere
The Android malware scanner called Bouncer, which Google uses to scrutinize all apps uploaded to Google Play, can personify easily bypassed, a pair of security researchers said on Monday.
Mobile security measures researchers Jon Oberheide and Charlie Miller have devised individual methods that could allow malicious apps to watch when they are being inspected by Google's digital scanner and hide their real purpose.
In Feb, Google revealed that it uses an in-house developed serving called Bouncer to scan all apps that are made in stock for download Oregon purchase on Google Play — and then known as the Humanoid Market — for signs of malware. The company explained that Chucker-out executes every newly uploaded app inside an Mechanical man emulator and analyzes its behavior.
Antivirus programs have long put-upon built-in emulators to safely observe how funny files behave when executed and most antivirus experts analyze malware samples in virtual machines. As a answer, a good deal of malware programs are at once designed to restrain their malicious doings if they find the use of emulated environments.
Oberheide and Miller took a quasi approach in their attempt to ring road Bouncer. "If you know your app is running in Bouncer, you just work dead," Oberheide aforesaid via email. "If you make out your app is outside Bouncer on a concrete user's gimmick, then you just pull back down your root exploit from an external server."
The two researchers created an app that connects rearmost to their server and allows them to number grassroots Linux commands happening the Android device where it runs. This is known as a link-back shell and can be opened by apps that don't require special Android permissions.
The researchers created a fake Google Playing period developer report, which Oberheide says is pretty easy to arrange, and submitted the app. When it got executed by Chucker-out inside its Android emulator for analysis, the app known as back home and allowed the researchers to gather information about the environment.
Using the connect-back beat opened by the app, Oberheide and Miller were able to identify bits of info that are single to the Bouncer system and can act like a fingermark. Malevolent apps can use this fingerprint to determine whether the organisation they run in is Google's digital scanner operating theatre a real device.
However, the link-back blast is not the only method that can be used to fingerprint Bouncer, Oberheide said. The researchers project to showcase some techniques they developed for this purpose on Friday, at the SummerCon league in New York.
"We've been in touch with the Android security team and will be working with them to address some of the problems we've discovered," Oberheide said in a web log post on Monday.
Nonetheless, the researcher doesn't believe that wholly fingerprinting techniques will be easy to block, because Google inevitably to suppress the ratio of false positive detections at a low level.
"If your app can fingerprint Bouncer using the same common operations that millions of apps use, then Google will be unable to flag information technology since information technology would be unworkable to also flag those millions of apps," Oberheide said via email.
Devising Bouncer unthinkable to fingerprint by removing all signs that it uses an emulated environment would besides be extremely ambitious, Oberheide aforementioned. However, its contemporary state canful exist improved, he said.
Google did not immediately return a asking for comment.
Source: https://www.pcworld.com/article/465062/researchers_find_ways_to_bypass_googles_android_malware_scanner.html
Posted by: hensonkettere.blogspot.com
0 Response to "Researchers Find Ways to Bypass Google’s Android Malware Scanner - hensonkettere"
Post a Comment