It is a fact that in the Android Market and Google malware sneaks reacts.
Bouncer have submitted, an automatic system that analyzes uploaded to Market
applications to detect (and eliminate) the potential malware detected. Is it
effective?
Google did not exert too strict controls on applications
programmers who rose to Android Market and could be
downloaded directly by users without going through a filter that
finds her safety. Apple, however, a study done much
tighter before publishing their applications in AppStore, so
which has allowed it to keep "margin" industry target
malware.
Bouncer Google aims with one hand, detect and eliminate the
known malware threats. Furthermore, the study also
developers and may deny access to potential fraudsters.
Although it was introduced now, Bouncer takes time working.
According to Google, this has allowed in 2011 to decay by 40% the number
hazardous discharges. Interestingly, Google seems
make a veiled criticism towards the houses and their messages antivirus
advertising: "This decline occurs while companies
that market and sell antivirus solutions report that
harmful applications are increasing. "
How it works
This is an automatic analysis software, which does not require the
developer go through any approval process.
* On the one hand, performs a static analysis when climbing one
application, looking for known malware. So, you miss one or more
firms antivirus engines. This is the same method that was Firefox
and, of course, is not sufficient by itself. In fact, it has
slinks allowed at least two occasions, in malware
official repository of Mozilla extensions.
* In addition, applications executing them dynamically analyzed
automatically in a virtual environment and checking their behavior.
Permits monitoring "abusive" to the terminal is a good
indicator that something strange may be happening. Depending on
how to hone their rules, this "heuristic" can be quite
effective. Is supposed to remain in effect while the assailants
know not detect this environment because, as is now commonly
in the PC world, the malicious code might not run if it detects that
is in a virtualized environment.
* For other accounts monitored developers to
prevent illegitimate applications go up again once they have been
detected. This step, although logical, not prevent accounts from being created
false or hijacked accounts to raise legal developers
malware.
With developments like Bouncer, Google claims that not a continuing
certain operating system image "unsafe" it is acquiring
Android, because of the ease to induce or downloading malware
supposedly hiding in legitimate applications. But above all, his
goal is to avoid headlines like this "The 'malware' in Android has
increased by 472%, "published in 2011.
Google did not exert too strict controls on applications
programmers who rose to Android Market and could be
downloaded directly by users without going through a filter that
finds her safety. Apple, however, a study done much
tighter before publishing their applications in AppStore, so
which has allowed it to keep "margin" industry target
malware.
Bouncer Google aims with one hand, detect and eliminate the
known malware threats. Furthermore, the study also
developers and may deny access to potential fraudsters.
Although it was introduced now, Bouncer takes time working.
According to Google, this has allowed in 2011 to decay by 40% the number
hazardous discharges. Interestingly, Google seems
make a veiled criticism towards the houses and their messages antivirus
advertising: "This decline occurs while companies
that market and sell antivirus solutions report that
harmful applications are increasing. "
How it works
This is an automatic analysis software, which does not require the
developer go through any approval process.
* On the one hand, performs a static analysis when climbing one
application, looking for known malware. So, you miss one or more
firms antivirus engines. This is the same method that was Firefox
and, of course, is not sufficient by itself. In fact, it has
slinks allowed at least two occasions, in malware
official repository of Mozilla extensions.
* In addition, applications executing them dynamically analyzed
automatically in a virtual environment and checking their behavior.
Permits monitoring "abusive" to the terminal is a good
indicator that something strange may be happening. Depending on
how to hone their rules, this "heuristic" can be quite
effective. Is supposed to remain in effect while the assailants
know not detect this environment because, as is now commonly
in the PC world, the malicious code might not run if it detects that
is in a virtualized environment.
* For other accounts monitored developers to
prevent illegitimate applications go up again once they have been
detected. This step, although logical, not prevent accounts from being created
false or hijacked accounts to raise legal developers
malware.
With developments like Bouncer, Google claims that not a continuing
certain operating system image "unsafe" it is acquiring
Android, because of the ease to induce or downloading malware
supposedly hiding in legitimate applications. But above all, his
goal is to avoid headlines like this "The 'malware' in Android has
increased by 472%, "published in 2011.