A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned

08/10/2021
by   Yun Shen, et al.
0

We study the temporal dynamics of potentially harmful apps (PHAs) on Android by leveraging 8.8M daily on-device detections collected among 11.7M customers of a popular mobile security product between 2019 and 2020. We show that the current security model of Android, which limits security products to run as regular apps and prevents them from automatically removing malicious apps opens a significant window of opportunity for attackers. Such apps warn users about the newly discovered threats, but users do not promptly act on this information, allowing PHAs to persist on their device for an average of 24 days after they are detected. We also find that while app markets remove PHAs after these become known, there is a significant delay between when PHAs are identified and when they are removed: PHAs persist on Google Play for 77 days on average and 34 days on third party marketplaces. Finally, we find evidence of PHAs migrating to other marketplaces after being removed on the original one. This paper provides an unprecedented view of the Android PHA landscape, showing that current defenses against PHAs on Android are not as effective as commonly thought, and identifying multiple research directions that the security community should pursue, from orchestrating more effective PHA takedowns to devising better alerts for mobile security products.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2022

Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView

Numerous studies demonstrated that browser fingerprinting is detrimental...
research
01/17/2022

Characterizing Sensor Leaks in Android Apps

While extremely valuable to achieve advanced functions, mobile phone sen...
research
12/13/2021

FirmwareDroid: Security Analysis of the Android Firmware EcoSystem

The Android Open Source Project (AOSP) is probably the most used and cus...
research
08/27/2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode

To defeat security threats such as man-in-the-middle (MITM) attacks, Blu...
research
12/01/2017

Flexible Installability of Android Apps with App-level Virtualization based Decomposition

With the popularity of smartphones, users are heavily dependent on mobil...
research
03/05/2021

App's Auto-Login Function Security Testing via Android OS-Level Virtualization

Limited by the small keyboard, most mobile apps support the automatic lo...
research
01/05/2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

In this paper, we seek to better understand Android obfuscation and depi...

Please sign up or login with your details

Forgot password? Click here to reset