SlideShare a Scribd company logo
1 of 15
The Rise of Android Malware and
Efficiency of Anti-virus
Daniel Adenew
Intorduction
 Popularity of Smartphones
 53% End of 2012
 A survey shows the amount of malware identified on
the Android platform has increased about 472%
during the period June 2011 to November 2011.
 Pressing Need of Anti-malware
 In this paper we will first take a look the cause of
rapid android malware increase and follows
analyzing the efficiency of the anti-malwares
Background Info
 Not always PC vs Always Connected Smart phones
 Un trusted Source
 Existence of Multiple Vendors and Update and Patch
dependency, New API
 No Evaluation; we can say very poor as that of
Apple.inc
 Open Source Platform and Permission request
permission they don’t require and user’s allow
 Rooting Feature  most EVIL! –Execute with High
Privilege.
Android Ant-Malware
 First Malware 2010,HTC
 471%This survey also goes on to say that 55% of
the identified malware was from applications that
were installed on the mobile device and 44% were
SMS Trojan horses.
Why we need Analysis?
 Because, there is no exact way of measuring anti-
malware tools and products?
 Every anti-virus product on android market claims its
full protection. So, the best we can do is to know
which one has highest detection rate. But, that
doesn’t be a simple task? Anti-Virus analysis seems
necessary because there doesn’t appear to be an
independent evaluation or efficiency anti-virus
measure tools.
The Question here can be Does the
antivirus protect the device or not?
 Answer is yes it does, but it is only to some extent or
not full protection.
Methodology of the research
Basis
 Can anti-virus detect a suspicious application?
 What is efficiency of any antivirus application in
protecting a given Android-enabled smart phone?
efficiency using two Questions
 Before and After installation ? Does the anti-virus
tool detect , disable , avoid and protect the device?
How is Selected?
 Using the rating value on the markets
 reviews given from different online magazine and
journals were also considered.
Two categories of research used on the report
R1 and R2,I named them.
R1 Criteria
Based on above criteria the research selected a six
anti-virus application to do the test analysis. And, two
popular spyware/malware tools i.e. malwares were
also selected based on rating and popularity.
How is Selected?
 R2 Criteria
 Based on above criteria the research selected a 41
anti-virus application to do the test analysis.
And, 618 spyware/malware tools i.e. malwares were
also selected based on rating and popularity.
Test Scenario
 Installing the spyware/malware before any antivirus
tools
 Installing the spyware/malware after any antivirus
tool installed on the device
Under the Following Conditions
 In R1,Testconditon where There android devices one
with root privilege available-
 In R2,Used android emulator for root privileged
exploitation and three android devices form known
vendors
 Since, there is no Vendor dependent malware?
Test Execution
 Based on two criteria?
 Malware Installed then anti-malware followed and
test examination-[with full system scan]
 Anti-malware installed then anti-malware followed
and test examination-[with full system scan[]
 In both case, efficiency was consider if anti-virus is
able to detect,avoid,protect the device?
Finding
 In R1 –used 6 anti-virsu tools and 2 popular malwares
 In R2,used 618 malware pkg,and all available anti-mlawre on the
market
 Result on R1
 In the first scenario .i.e installing the malware before any anti-virus
product.
 The result shows that out the 6 selected anti-virus applications, only
two can detect and disable the two of the spywares/malwares and
rest tested anti-virus can only detect and not disable them.
 In the second used on this research, i.e installing spyware after the
anti-virus installation.
 The result shows that out the 6 selected anti-virus applications, only
two can detect and disable the two of the spywares/malwares and
rest tested anti-virus can’t able to neither to identify, detect nor to
disable them. It also noted the anti-virus was also infected by the
spyware/malwares.
Result continued…
 R2
This research used categorization of detection rate, as
there is no exact detection rate to categorize all
, fluctuates.
first category contains products that detected over
90%, the second category 90% to 65%,
the third 65% to 40%,
the fourth everything less than 40% but above 0%
and finally the last group contains the products that
didn’t detect anything.
this groups were found to be from un trusted market.
Conclusion
 Form the result on the research it can be said that not all
anti- virus products are effective at preventing malware
and spyware from infecting an Android phone.
 Showed AOS has many security holes
 The application test for security in android market are
weak,[Trojan]
 Check rating and new apps before downloading
 Limit permission ,in Jelly bean 4.1
 Root privilege feature most not be enabled, with out trust
 Need more research
++++++++++++++++++Thank you!+++++++++++++++

More Related Content

What's hot

Tech that unites the whole-of-society
Tech that unites the whole-of-societyTech that unites the whole-of-society
Tech that unites the whole-of-societyNUS-ISS
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsNagamalleswararao Tadikonda
 
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...Lili Wei
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Benchpress: Analyzing Android App Vulnerability Benchmark Suites
Benchpress:  Analyzing Android App Vulnerability Benchmark SuitesBenchpress:  Analyzing Android App Vulnerability Benchmark Suites
Benchpress: Analyzing Android App Vulnerability Benchmark SuitesVenkatesh Prasad Ranganath
 
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...Lili Wei
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeJai Mehta
 
Madam synopis
Madam synopisMadam synopis
Madam synopisuttarkar
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...UltraUploader
 

What's hot (18)

Tech that unites the whole-of-society
Tech that unites the whole-of-societyTech that unites the whole-of-society
Tech that unites the whole-of-society
 
Mobile Apps Security Testing -3
Mobile Apps Security Testing -3Mobile Apps Security Testing -3
Mobile Apps Security Testing -3
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook Applications
 
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Benchpress: Analyzing Android App Vulnerability Benchmark Suites
Benchpress:  Analyzing Android App Vulnerability Benchmark SuitesBenchpress:  Analyzing Android App Vulnerability Benchmark Suites
Benchpress: Analyzing Android App Vulnerability Benchmark Suites
 
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
 
321
321321
321
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security Knowledge
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Madam synopis
Madam synopisMadam synopis
Madam synopis
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...
 

Similar to Android Malware Rise and Anti-virus Effectiveness Analysis

Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishDaniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsImperva
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsAnatoliy Tkachev
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011Anatoliy Tkachev
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware DetectionIRJET Journal
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applicationsijtsrd
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_uslinkedinbeam
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:Nancy Nimmegeers
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for androidJPINFOTECH JAYAPRAKASH
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new milleniumUltraUploader
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012Shivmohan Yadav
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 

Similar to Android Malware Rise and Anti-virus Effectiveness Analysis (20)

Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus Solutions
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Security survey2013 en
Security survey2013 enSecurity survey2013 en
Security survey2013 en
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new millenium
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 

More from Daniel Adenew

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Daniel Adenew
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovativeDaniel Adenew
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia orgDaniel Adenew
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Daniel Adenew
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galDaniel Adenew
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_htmlDaniel Adenew
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Daniel Adenew
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite SlideDaniel Adenew
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Daniel Adenew
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webDaniel Adenew
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDaniel Adenew
 

More from Daniel Adenew (13)

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovative
 
Osdethiopia org
Osdethiopia orgOsdethiopia org
Osdethiopia org
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia org
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com
Edge develop comEdge develop com
Edge develop com
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew web
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel Adenew
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Android Malware Rise and Anti-virus Effectiveness Analysis

  • 1. The Rise of Android Malware and Efficiency of Anti-virus Daniel Adenew
  • 2. Intorduction  Popularity of Smartphones  53% End of 2012  A survey shows the amount of malware identified on the Android platform has increased about 472% during the period June 2011 to November 2011.  Pressing Need of Anti-malware  In this paper we will first take a look the cause of rapid android malware increase and follows analyzing the efficiency of the anti-malwares
  • 3. Background Info  Not always PC vs Always Connected Smart phones  Un trusted Source  Existence of Multiple Vendors and Update and Patch dependency, New API  No Evaluation; we can say very poor as that of Apple.inc  Open Source Platform and Permission request permission they don’t require and user’s allow  Rooting Feature  most EVIL! –Execute with High Privilege.
  • 4. Android Ant-Malware  First Malware 2010,HTC  471%This survey also goes on to say that 55% of the identified malware was from applications that were installed on the mobile device and 44% were SMS Trojan horses.
  • 5. Why we need Analysis?  Because, there is no exact way of measuring anti- malware tools and products?  Every anti-virus product on android market claims its full protection. So, the best we can do is to know which one has highest detection rate. But, that doesn’t be a simple task? Anti-Virus analysis seems necessary because there doesn’t appear to be an independent evaluation or efficiency anti-virus measure tools.
  • 6. The Question here can be Does the antivirus protect the device or not?  Answer is yes it does, but it is only to some extent or not full protection.
  • 7. Methodology of the research Basis  Can anti-virus detect a suspicious application?  What is efficiency of any antivirus application in protecting a given Android-enabled smart phone? efficiency using two Questions  Before and After installation ? Does the anti-virus tool detect , disable , avoid and protect the device?
  • 8. How is Selected?  Using the rating value on the markets  reviews given from different online magazine and journals were also considered. Two categories of research used on the report R1 and R2,I named them. R1 Criteria Based on above criteria the research selected a six anti-virus application to do the test analysis. And, two popular spyware/malware tools i.e. malwares were also selected based on rating and popularity.
  • 9. How is Selected?  R2 Criteria  Based on above criteria the research selected a 41 anti-virus application to do the test analysis. And, 618 spyware/malware tools i.e. malwares were also selected based on rating and popularity.
  • 10. Test Scenario  Installing the spyware/malware before any antivirus tools  Installing the spyware/malware after any antivirus tool installed on the device
  • 11. Under the Following Conditions  In R1,Testconditon where There android devices one with root privilege available-  In R2,Used android emulator for root privileged exploitation and three android devices form known vendors  Since, there is no Vendor dependent malware?
  • 12. Test Execution  Based on two criteria?  Malware Installed then anti-malware followed and test examination-[with full system scan]  Anti-malware installed then anti-malware followed and test examination-[with full system scan[]  In both case, efficiency was consider if anti-virus is able to detect,avoid,protect the device?
  • 13. Finding  In R1 –used 6 anti-virsu tools and 2 popular malwares  In R2,used 618 malware pkg,and all available anti-mlawre on the market  Result on R1  In the first scenario .i.e installing the malware before any anti-virus product.  The result shows that out the 6 selected anti-virus applications, only two can detect and disable the two of the spywares/malwares and rest tested anti-virus can only detect and not disable them.  In the second used on this research, i.e installing spyware after the anti-virus installation.  The result shows that out the 6 selected anti-virus applications, only two can detect and disable the two of the spywares/malwares and rest tested anti-virus can’t able to neither to identify, detect nor to disable them. It also noted the anti-virus was also infected by the spyware/malwares.
  • 14. Result continued…  R2 This research used categorization of detection rate, as there is no exact detection rate to categorize all , fluctuates. first category contains products that detected over 90%, the second category 90% to 65%, the third 65% to 40%, the fourth everything less than 40% but above 0% and finally the last group contains the products that didn’t detect anything. this groups were found to be from un trusted market.
  • 15. Conclusion  Form the result on the research it can be said that not all anti- virus products are effective at preventing malware and spyware from infecting an Android phone.  Showed AOS has many security holes  The application test for security in android market are weak,[Trojan]  Check rating and new apps before downloading  Limit permission ,in Jelly bean 4.1  Root privilege feature most not be enabled, with out trust  Need more research ++++++++++++++++++Thank you!+++++++++++++++