RiskIQ, an IT security-software company, recently examined 350,000 apps that offer monetary transactions, and found more than 40,000 of these specialized programs to be little more than scams. Employees had downloaded the apps from around 90 recognized app store websites worldwide, and analyzed them. They discovered that a total of eleven percent of these apps contained malicious executable functions - they could read along personal messages, or remove password protections. And all this would typically take place unnoticed by the user.
Computer scientists from Saarbrücken have now developed a software system that allows users to detect malicious apps at an early stage. This is achieved by scanning the program code, with an emphasis on those parts where the respective app is accessing or transmitting personal information. The monitoring software will detect whether a data request is related to the subsequent transmission of data, and will flag the code sequence in question as suspicious accordingly. "Imagine your address book is read out, and hundreds of lines of code later, without you noticing, your phone will send your contacts to an unknown website," Erik Derr says. Derr is a PhD student at the Graduate School for Computer Science at Saarland University, and a researcher at the Saarbrücken Research Center for IT Security, CISPA. An important feature of the software he developed is its ability to monitor precisely which websites an app is accessing, or which phone number a text message was sent to.
To conclusively detect these functional relationships between the data source and the recipient, the researchers use contemporary methods of information flow analysis. They set their program up in advance with a list of suspicious code combinations that access programming interfaces, so that it would learn to differentiate between "good" and "evil" apps, and additionally fed it with details of currently known attacks. "So it can be helpful, for instance, to know the telephone numbers of these expensive premium services. Say one of these numbers is dialed without the consent of the user, then the fraud is obvious," Derr explains. Since his method is computationally demanding and also requires a lot of memory space, the software is run on a dedicated server. "It takes our software an average of 25 minutes per app," Derr says. So far, his research team has tested around 23,000 apps in this manner. And of course, consumers will benefit most from this approach. "The app could be analyzed on our server, and the results would be displayed on your smartphone. Or ideally, the evaluation process could be integrated directly into the app store websites," explains Derr. This is one of the reasons the Saarbrücken researchers are already discussing the issue with US online retail company Amazon. "But Google would certainly be an option as well,", says Derr.
Background Information on Computer Science in Saarbrücken
The Department of Computer Science represents the center of computer science research in Saarbrücken. Seven other internationally renowned research institutes are nearby: The Max Planck Institutes for Informatics and for Software Systems, the German Research Center for Artificial Intelligence (DFKI), the Center for Bioinformatics, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA), and the Cluster of Excellence "Multimodal Computing and Interaction".
Center For IT Security, Privacy and Accountability CISPA
Phone: +49 681 302 57368
Competence Center Computer Science Saarland
Phone: +49 681 302-70741
Information for Radio Journalists: Phone interviews with Saarland University scientists can be conducted in studio quality using the Radio Codec (via direct-dial IP connection, or the ARD Sternpunkt 106813020001). Interview requests can be made via our press department (+49 681 302-2601).