Security boffins slip past Google Bouncer

Powered by SC Magazine
 

New app store security checkpoint misses malicious app.

Researchers have slipped malware past the new Android app store security control, and mapped its environment.

Google revealed the Bouncer control in February as a means of scanning the Android market for malicious software, without requiring developers to go through an Apple-like application approval process.

Uploaded apps would be analysed for known malware and malicious behaviour via a sandbox on Google’s cloud infrastructure.

Bouncer would also evict developers known as repeat offenders.

But security boffins Jon Oberheide and Charlie Miller have demonstrated how malicious code could be obfuscated within an application to skirt Bouncer and be uploaded to the Google Play Store.

The demonstration, to be presented at the US SummerCon event this week, also mapped out and fingerprinted the Bouncer infrastructure environment after it ran dynamic analysis of the booby-trapped app and granted an interactive remote shell.

Oberheide and Miller obtained Bouncer’s kernel version, the guts of its filesystem, and data on emulated devices run within its environment.

“So this is just one technique to fingerprint the Bouncer environment, allowing a malicious app to appear benign when run within Bouncer, and yet still perform malicious activities when run on a real user’s device,” Oberheide said.

Last year, Android device activations grew 250 percent while app store downloads topped 11 billion. But the bypass wasn’t a death knell for Bouncer.

“While Bouncer may be unable to catch sophisticated malware from knowledgeable adversaries currently, we’re confident that Google will continue to improve and evolve its capabilities,” Oberheide said.

Android engineering cheif Hiroshi Lockheimer said of Bouncer that "no security approach is foolproof, and added scrutiny can often lead to important improvements."

"Our systems are getting better at detecting and eliminating malware every day, and we continue to invite the community to work with us to keep Android safe."

The researchers had advised Google of the bypass and were assisting the Android security team to develop a fix.

Copyright © SC Magazine, Australia


Security boffins slip past Google Bouncer
 
 
 
Top Stories
Photos: iTnews Benchmark Awards countdown begins
Just a few days left until entries close for 2014.
 
Australian Govt to rethink cyber security strategy
Six-year old policy to be refreshed.
 
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
More 4G from Optus in Darwin
Nov 21, 2014
Click to see where Optus has expanded coverage to the suburbs near Darwin.
Optus steps up regional 4G coverage
Nov 20, 2014
Once 700Mhz services are working, Optus claims regional users will have a "faster and more ...
This Huawei 4G phone costs $99
Nov 12, 2014
The $99 Huawei Ascend Y550, available through Vodafone, enters the budget market as one of the ...
4G smartphones: Microsoft's Lumia 830
Nov 7, 2014
Microsoft has announced its flagship Windows Phone, the Nokia Lumia 830 4G, will be available in ...
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1031

Vote