Categories: Technology

Google Explains How It Spots Malicious Android Apps

Android’s Verify Apps feature performs malware scans on newly downloaded applications to make sure they’re safe. However since some malicious Android apps can prevent the feature from working, the company had to find an alternative way to figure out if a phone stopped using Verify because you no longer use it or if it’s due to malware lurking in your device.

In a detailed blog post on Android Developers, Google explains the state-of-the-art methods it employs to examine the safety of a selected application, even in cases in which Verify’s verdict is unavailable. The post delves into the problematic algorithms and security practices that Google makes use of to proactively become aware of and mitigate potential threats posed by means of malicious apps, highlighting the company’s ongoing commitment to safeguarding personal facts and enhancing the general protection of the Android ecosystem.

“To understand this problem more deeply,” the post reads, “the Android Security team correlates app install attempts and Dead or Insecure (DOI) devices.” To note, the team marks devices that stopped checking up with Verify as DOI and those that continue to use the feature as “retained.”

The protection team utilizes particular components to calculate the app’s retention charge, which is essentially the share of all devices that have been retained after downloading it within a single day. This calculation involves thinking about different factors and records points to make certain an correct assessment of the app’s overall performance in phrases of consumer engagement and durability.

N = Number of devices that downloaded the app.

x = Number of retained devices that downloaded the app.

p = Probability of a device downloading any app will be retained.

Z = Represents the DOI score.

© Google

If Z or the DOI score falls below -3.7, it means a large number of phones or tablets stopped checking with Verify the moment they installed the app. After Google inspects the app more closely, it conducts a thorough analysis to ascertain whether it poses any genuine harm. If deemed harmful, Google takes proactive measures by first removing any existing installations and subsequently implementing safeguards to prevent any future downloads of the app.

The company highlighted that implementing this specific method significantly enhanced the Security team’s ability to uncover numerous applications that were compromised by malware strains such as Hummingbad, Ghost Push, and Gooligan in previous instances. Without the utilization of this approach, these potentially harmful apps could have easily evaded detection.

Article Originally from Google 

Sameer
Sameer is a writer, entrepreneur and investor. He is passionate about inspiring entrepreneurs and women in business, telling great startup stories, providing readers with actionable insights on startup fundraising, startup marketing and startup non-obviousnesses and generally ranting on things that he thinks should be ranting about all while hoping to impress upon them to bet on themselves (as entrepreneurs) and bet on others (as investors or potential board members or executives or managers) who are really betting on themselves but need the motivation of someone else’s endorsement to get there. Sameer is a writer, entrepreneur and investor. He is passionate about inspiring entrepreneurs and women in business, telling great startup stories, providing readers with actionable insights on startup fundraising, startup marketing and startup non-obviousnesses and generally ranting on things that he thinks should be ranting about all while hoping to impress upon them to bet on themselves (as entrepreneurs) and bet on others (as investors or potential board members or executives or managers) who are really betting on themselves but need the motivation of someone else’s endorsement to get there.

Recent Posts

Instagram Search Queries Optimization: How to Rank Higher in Instagram Search (2026 Guide)

In 2026, Instagram is no longer just a social media platform. It has evolved into a powerful search engine where…

1 hour ago

Drovenio IT Career Tips USA (2026): High-Paying Tech Jobs, Skills, Salary & Roadmap

Introduction Drovenio IT Career Tips USA is your complete roadmap to building a high-paying tech career in 2026, especially in…

2 hours ago

5 Ways to Maximize Returns Using a Demat Account for Stock Trading

In today’s dynamic financial landscape, a Demat account is not merely a storage facility for securities—it is a powerful tool…

6 hours ago

Why Smart Entrepreneurs Treat Medical Emergencies Like Bad PR (And Prepare Accordingly)

Entrepreneurs obsess over financial risks, but physical emergencies in the workplace can ruin a business instantly. Providing proper first aid…

12 hours ago

The Smart Consumer’s Guide to Choosing Premium Organic Meat: What Sets Award-Winning Brands Apart

Buying good meat shouldn't be complicated, but with so many brands slapping "organic" and "premium" on their packaging, it's become…

13 hours ago

Elfa Pods – Smooth Flavor Delivery with Advanced Pod Technology

Modern vaping devices are designed to provide convenience, consistent performance, and satisfying flavor with every puff. Many users today prefer…

13 hours ago