back to article DARPA-funded team says it can SMELL Android malware

A trio of DARPA-backed Iowa State University researchers have developed a tool to help speed up android malware analysis. The Security Toolbox developed by the DARPA blue team uses features including 'smells' which sport stronger heuristics to flag possible signs of hidden malware badness. Benjamin Holland, Tom Deering, and …

  1. Shannon Jacobs
    Holmes

    Follow the MONEY. How does the MONEY smell?

    If the google would make it possible for us to know more about the financial models of the developers, that would be the most important factor in detecting malware. If the developer has a sound business model, we don't need to see all the details. It would be sufficient if the google added an annotation something like "Yes, this developer claims to be selling lots of full-featured versions, and our records support that claim" or "This developer claims to be ad-supported, and we confirm substantial ad-related payments." In cases like that, we'd know there is good reason for the developer to be legit, but in another case "The developer claims to be independently wealthy, but we have no evidence of that claim", then the alarm bells should go off.

    1. Irongut

      Re: Follow the MONEY. How does the MONEY smell?

      That would flag up almost all open source projects, homebrew projects and quite a lot of other perfectly benign software while ignoring the spyware created by multinational corporations.

      Bad idea.

    2. BillG
      Devil

      Unless

      The Security Toolbox developed by the DARPA blue team uses features including 'smells' which sport stronger heuristics to flag possible signs of hidden malware badness...

      "...unless the malware came from the NSA, in which case it is not flagged."

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like