SlideShare a Scribd company logo
1 of 15
The Rise of Android Malware and
Efficiency of Anti-virus
Daniel Adenew
Intorduction
 Popularity of Smartphones
 53% End of 2012
 A survey shows the amount of malware identified on
the Android platform has increased about 472%
during the period June 2011 to November 2011.
 Pressing Need of Anti-malware
 In this paper we will first take a look the cause of
rapid android malware increase and follows
analyzing the efficiency of the anti-malwares
Background Info
 Not always PC vs Always Connected Smart phones
 Un trusted Source
 Existence of Multiple Vendors and Update and Patch
dependency, New API
 No Evaluation; we can say very poor as that of
Apple.inc
 Open Source Platform and Permission request
permission they don’t require and user’s allow
 Rooting Feature  most EVIL! –Execute with High
Privilege.
Android Ant-Malware
 First Malware 2010,HTC
 471%This survey also goes on to say that 55% of
the identified malware was from applications that
were installed on the mobile device and 44% were
SMS Trojan horses.
Why we need Analysis?
 Because, there is no exact way of measuring anti-
malware tools and products?
 Every anti-virus product on android market claims its
full protection. So, the best we can do is to know
which one has highest detection rate. But, that
doesn’t be a simple task? Anti-Virus analysis seems
necessary because there doesn’t appear to be an
independent evaluation or efficiency anti-virus
measure tools.
The Question here can be Does the
antivirus protect the device or not?
 Answer is yes it does, but it is only to some extent or
not full protection.
Methodology of the research
Basis
 Can anti-virus detect a suspicious application?
 What is efficiency of any antivirus application in
protecting a given Android-enabled smart phone?
efficiency using two Questions
 Before and After installation ? Does the anti-virus
tool detect , disable , avoid and protect the device?
How is Selected?
 Using the rating value on the markets
 reviews given from different online magazine and
journals were also considered.
Two categories of research used on the report
R1 and R2,I named them.
R1 Criteria
Based on above criteria the research selected a six
anti-virus application to do the test analysis. And, two
popular spyware/malware tools i.e. malwares were
also selected based on rating and popularity.
How is Selected?
 R2 Criteria
 Based on above criteria the research selected a 41
anti-virus application to do the test analysis.
And, 618 spyware/malware tools i.e. malwares were
also selected based on rating and popularity.
Test Scenario
 Installing the spyware/malware before any antivirus
tools
 Installing the spyware/malware after any antivirus
tool installed on the device
Under the Following Conditions
 In R1,Testconditon where There android devices one
with root privilege available-
 In R2,Used android emulator for root privileged
exploitation and three android devices form known
vendors
 Since, there is no Vendor dependent malware?
Test Execution
 Based on two criteria?
 Malware Installed then anti-malware followed and
test examination-[with full system scan]
 Anti-malware installed then anti-malware followed
and test examination-[with full system scan[]
 In both case, efficiency was consider if anti-virus is
able to detect,avoid,protect the device?
Finding
 In R1 –used 6 anti-virsu tools and 2 popular malwares
 In R2,used 618 malware pkg,and all available anti-mlawre on the
market
 Result on R1
 In the first scenario .i.e installing the malware before any anti-virus
product.
 The result shows that out the 6 selected anti-virus applications, only
two can detect and disable the two of the spywares/malwares and
rest tested anti-virus can only detect and not disable them.
 In the second used on this research, i.e installing spyware after the
anti-virus installation.
 The result shows that out the 6 selected anti-virus applications, only
two can detect and disable the two of the spywares/malwares and
rest tested anti-virus can’t able to neither to identify, detect nor to
disable them. It also noted the anti-virus was also infected by the
spyware/malwares.
Result continued…
 R2
This research used categorization of detection rate, as
there is no exact detection rate to categorize all
, fluctuates.
first category contains products that detected over
90%, the second category 90% to 65%,
the third 65% to 40%,
the fourth everything less than 40% but above 0%
and finally the last group contains the products that
didn’t detect anything.
this groups were found to be from un trusted market.
Conclusion
 Form the result on the research it can be said that not all
anti- virus products are effective at preventing malware
and spyware from infecting an Android phone.
 Showed AOS has many security holes
 The application test for security in android market are
weak,[Trojan]
 Check rating and new apps before downloading
 Limit permission ,in Jelly bean 4.1
 Root privilege feature most not be enabled, with out trust
 Need more research
++++++++++++++++++Thank you!+++++++++++++++

More Related Content

What's hot

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
Eric Zhuo
 
Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...
UltraUploader
 

What's hot (18)

Tech that unites the whole-of-society
Tech that unites the whole-of-societyTech that unites the whole-of-society
Tech that unites the whole-of-society
 
Mobile Apps Security Testing -3
Mobile Apps Security Testing -3Mobile Apps Security Testing -3
Mobile Apps Security Testing -3
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook Applications
 
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
ICSE 2019 - PIVOT: Learning API-Device Correlations to Facilitate Android Com...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Benchpress: Analyzing Android App Vulnerability Benchmark Suites
Benchpress:  Analyzing Android App Vulnerability Benchmark SuitesBenchpress:  Analyzing Android App Vulnerability Benchmark Suites
Benchpress: Analyzing Android App Vulnerability Benchmark Suites
 
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
ASE 2016 Taming Android Fragmentation: Characterizing and Detecting Compatibi...
 
321
321321
321
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security Knowledge
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Madam synopis
Madam synopisMadam synopis
Madam synopis
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...Application of data mining based malicious code detection techniques for dete...
Application of data mining based malicious code detection techniques for dete...
 

Similar to The rise of android malware and efficiency of Anti-Virus

Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Daniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Комсс Файквэе
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
Anatoliy Tkachev
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
Anatoliy Tkachev
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new millenium
UltraUploader
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
Shivmohan Yadav
 

Similar to The rise of android malware and efficiency of Anti-Virus (20)

Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus Solutions
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Security survey2013 en
Security survey2013 enSecurity survey2013 en
Security survey2013 en
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new millenium
 
Mobile threatreport q1_2012
Mobile threatreport q1_2012Mobile threatreport q1_2012
Mobile threatreport q1_2012
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 

More from Daniel Adenew

Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
Daniel Adenew
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew web
Daniel Adenew
 

More from Daniel Adenew (13)

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovative
 
Osdethiopia org
Osdethiopia orgOsdethiopia org
Osdethiopia org
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia org
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com
Edge develop comEdge develop com
Edge develop com
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew web
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel Adenew
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The rise of android malware and efficiency of Anti-Virus

  • 1. The Rise of Android Malware and Efficiency of Anti-virus Daniel Adenew
  • 2. Intorduction  Popularity of Smartphones  53% End of 2012  A survey shows the amount of malware identified on the Android platform has increased about 472% during the period June 2011 to November 2011.  Pressing Need of Anti-malware  In this paper we will first take a look the cause of rapid android malware increase and follows analyzing the efficiency of the anti-malwares
  • 3. Background Info  Not always PC vs Always Connected Smart phones  Un trusted Source  Existence of Multiple Vendors and Update and Patch dependency, New API  No Evaluation; we can say very poor as that of Apple.inc  Open Source Platform and Permission request permission they don’t require and user’s allow  Rooting Feature  most EVIL! –Execute with High Privilege.
  • 4. Android Ant-Malware  First Malware 2010,HTC  471%This survey also goes on to say that 55% of the identified malware was from applications that were installed on the mobile device and 44% were SMS Trojan horses.
  • 5. Why we need Analysis?  Because, there is no exact way of measuring anti- malware tools and products?  Every anti-virus product on android market claims its full protection. So, the best we can do is to know which one has highest detection rate. But, that doesn’t be a simple task? Anti-Virus analysis seems necessary because there doesn’t appear to be an independent evaluation or efficiency anti-virus measure tools.
  • 6. The Question here can be Does the antivirus protect the device or not?  Answer is yes it does, but it is only to some extent or not full protection.
  • 7. Methodology of the research Basis  Can anti-virus detect a suspicious application?  What is efficiency of any antivirus application in protecting a given Android-enabled smart phone? efficiency using two Questions  Before and After installation ? Does the anti-virus tool detect , disable , avoid and protect the device?
  • 8. How is Selected?  Using the rating value on the markets  reviews given from different online magazine and journals were also considered. Two categories of research used on the report R1 and R2,I named them. R1 Criteria Based on above criteria the research selected a six anti-virus application to do the test analysis. And, two popular spyware/malware tools i.e. malwares were also selected based on rating and popularity.
  • 9. How is Selected?  R2 Criteria  Based on above criteria the research selected a 41 anti-virus application to do the test analysis. And, 618 spyware/malware tools i.e. malwares were also selected based on rating and popularity.
  • 10. Test Scenario  Installing the spyware/malware before any antivirus tools  Installing the spyware/malware after any antivirus tool installed on the device
  • 11. Under the Following Conditions  In R1,Testconditon where There android devices one with root privilege available-  In R2,Used android emulator for root privileged exploitation and three android devices form known vendors  Since, there is no Vendor dependent malware?
  • 12. Test Execution  Based on two criteria?  Malware Installed then anti-malware followed and test examination-[with full system scan]  Anti-malware installed then anti-malware followed and test examination-[with full system scan[]  In both case, efficiency was consider if anti-virus is able to detect,avoid,protect the device?
  • 13. Finding  In R1 –used 6 anti-virsu tools and 2 popular malwares  In R2,used 618 malware pkg,and all available anti-mlawre on the market  Result on R1  In the first scenario .i.e installing the malware before any anti-virus product.  The result shows that out the 6 selected anti-virus applications, only two can detect and disable the two of the spywares/malwares and rest tested anti-virus can only detect and not disable them.  In the second used on this research, i.e installing spyware after the anti-virus installation.  The result shows that out the 6 selected anti-virus applications, only two can detect and disable the two of the spywares/malwares and rest tested anti-virus can’t able to neither to identify, detect nor to disable them. It also noted the anti-virus was also infected by the spyware/malwares.
  • 14. Result continued…  R2 This research used categorization of detection rate, as there is no exact detection rate to categorize all , fluctuates. first category contains products that detected over 90%, the second category 90% to 65%, the third 65% to 40%, the fourth everything less than 40% but above 0% and finally the last group contains the products that didn’t detect anything. this groups were found to be from un trusted market.
  • 15. Conclusion  Form the result on the research it can be said that not all anti- virus products are effective at preventing malware and spyware from infecting an Android phone.  Showed AOS has many security holes  The application test for security in android market are weak,[Trojan]  Check rating and new apps before downloading  Limit permission ,in Jelly bean 4.1  Root privilege feature most not be enabled, with out trust  Need more research ++++++++++++++++++Thank you!+++++++++++++++