Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Network Security, Threat Management, Malware, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Google using custom malware scanner for Android apps

Google has been using a home-grown tool to scan mobile applications as a way to prevent its Android Market from becoming fertile ground for malware spread, the tech giant announced Thursday.

Known as "Bouncer," the service studies new and existing applications, looking for anomalies that could signal a program that is up to no good.

"We actually run every application on Google's cloud infrastructure and simulate how it will run on an Android device to look for hidden, malicious behavior," Hiroshi Lockheimer, Android's vice president of engineering, wrote in a post on the Google Mobile Blog. "We also analyze new developer accounts to help prevent malicious and repeat-offending developers from coming back."

Lockheimer credited Bouncer with lowering the number of "potentially" malicious downloads in the Android Market by 40 percent, between the first and second half of 2011. It is unclear why Google waited so long to announce the new service.

He admitted that Google's findings run counter to what many security firms have been saying, including a recent report from Juniper Networks, which found that malicious Android samples have spiked 472 percent since July, And a 2012 prediction report from Lookout Mobile Security, which makes Android security products, said more than $1 million was stolen from Android users last year due to mobile threats, and that the annual malware-encounter rate has increased to four percent.

In November, a Google engineer, in a personal blog post, shrugged off suggestions that the Android operating system wasn't secure.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.