Categories: Technology

Google Explains How It Spots Malicious Android Apps

Android’s Verify Apps feature performs malware scans on newly downloaded applications to make sure they’re safe. However since some malicious Android apps can prevent the feature from working, the company had to find an alternative way to figure out if a phone stopped using Verify because you no longer use it or if it’s due to malware lurking in your device.

In a detailed blog post on Android Developers, Google explains the state-of-the-art methods it employs to examine the safety of a selected application, even in cases in which Verify’s verdict is unavailable. The post delves into the problematic algorithms and security practices that Google makes use of to proactively become aware of and mitigate potential threats posed by means of malicious apps, highlighting the company’s ongoing commitment to safeguarding personal facts and enhancing the general protection of the Android ecosystem.

“To understand this problem more deeply,” the post reads, “the Android Security team correlates app install attempts and Dead or Insecure (DOI) devices.” To note, the team marks devices that stopped checking up with Verify as DOI and those that continue to use the feature as “retained.”

The protection team utilizes particular components to calculate the app’s retention charge, which is essentially the share of all devices that have been retained after downloading it within a single day. This calculation involves thinking about different factors and records points to make certain an correct assessment of the app’s overall performance in phrases of consumer engagement and durability.

N = Number of devices that downloaded the app.

x = Number of retained devices that downloaded the app.

p = Probability of a device downloading any app will be retained.

Z = Represents the DOI score.

© Google

If Z or the DOI score falls below -3.7, it means a large number of phones or tablets stopped checking with Verify the moment they installed the app. After Google inspects the app more closely, it conducts a thorough analysis to ascertain whether it poses any genuine harm. If deemed harmful, Google takes proactive measures by first removing any existing installations and subsequently implementing safeguards to prevent any future downloads of the app.

The company highlighted that implementing this specific method significantly enhanced the Security team’s ability to uncover numerous applications that were compromised by malware strains such as Hummingbad, Ghost Push, and Gooligan in previous instances. Without the utilization of this approach, these potentially harmful apps could have easily evaded detection.

Article Originally from Google 

Sameer
Sameer is a writer, entrepreneur and investor. He is passionate about inspiring entrepreneurs and women in business, telling great startup stories, providing readers with actionable insights on startup fundraising, startup marketing and startup non-obviousnesses and generally ranting on things that he thinks should be ranting about all while hoping to impress upon them to bet on themselves (as entrepreneurs) and bet on others (as investors or potential board members or executives or managers) who are really betting on themselves but need the motivation of someone else’s endorsement to get there.

Recent Posts

The Biggest Challenges Modern Entrepreneurs Face and How to Overcome

Starting a business today is exciting, but it can feel like swimming upstream. You have a big dream, you want…

13 hours ago

Top 9 TikTok Management Tools for Agencies and Creators in 2025

TikTok has exploded into one of the most influential social media platforms in the world, with over 1 billion active…

20 hours ago

Why Speed, Security, and SEO All Start With Charlotte WordPress Developers

The Digital Trifecta No One Warns You About Charlotte WordPress developers don’t just make a website pretty; they make it…

2 days ago

The Importance of Financial Security in the Digital Era

In today’s digital age, the way we manage money has drastically changed. From online banking to digital wallets and mobile…

2 days ago

India in Stories: The Cultural Canvas of Amar Chitra Katha Generations have grown up reading Amar Chitra

Katha comics, where India’s heritage is woven into colourful panels, featuring unforgettable characters. For many, these slim comic books were…

2 days ago

Enhancing Utility and Comfort: The Role of Can-Am Defender Accessories and Soft Doors

The Can-Am Defender is one of the most capable and versatile UTVs ever built. Whether you’re crossing rugged trails, tending…

2 days ago