Google is ramping up Android security protection with new Android app safety tools

An Android phone being held in the hand
(Image credit: Shutterstock / mindea)

  • Android's security team partners with Mandiant FLARE for upgrade
  • The capa open source binary analysis tool is being enhanced
  • Gemini AI is being thrown in the mix, too

Google is ramping up its Android security protection with new app safety tools.

In a new blog post, Google’s Lin Chen announced the company’s Android Security and Privacy Team is partnering with Mandiant FLARE, to enhance the capa open source binary analysis tool. That way, the tool will be better at analyzing ARM ELF files, often used in Android malware.

Chen said this collaboration will help detect and highlight suspicious code behaviors in native files, enabling faster malware analysis and decision-making, with the help of Gemini AI.

Detecting malware in ELF

Describing how the new tools work, Chen shared a case study of an illegal gambling app disguised as a music app. This app, found on the Google Play Store, was secretly loading gambling websites for users in specific regions. It used different anti-analysis techniques (hiding key functions in a native ELF file, timezone detection, dynamic downloading and decryption of additional malicious code) to stay hidden in plain sight.

However, by leveraging static analysis and capa, Google's team identified these deceptive behaviors and successfully removed the app.

Capa detects malware capabilities in ELF files, and new rules have been developed specifically for Android, Chen further explained.

These rules identify behaviors like ptrace API calls (anti-debugging), extracting device and timezone info via JNI, downloading and decrypting code, using Base64 & Cipher API for encoding/encryption, allowing analysts to quickly locate suspicious functions, without needing to sift through mountains of obfuscated code.

Google also added Gemini AI to summarize the most suspicious functions highlighted by capa. The AI tool can do risk level assessments, insights into obfuscation, anti-debugging, and cloaking tactics, enabling a faster, and more effective, malware detection and rule-writing.

“Equipped with the fast-evolving Gemini, our analysts are able to spend less time on those sophisticated samples, minimising the exposure for malicious apps and ensuring the safety of Android ecosystems,” Chen concluded.

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
A hand reaching out to touch a futuristic rendering of an AI processor.
Google says Gemini is being misused to launch major cyberattacks
A hand reaching out to touch a futuristic rendering of an AI processor.
Google Cloud unveils new AI Protection security tools, no matter which model you use
Malware worm
Coordinated global mobile malware campaign targets banking apps and cryptocurrency platforms
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Over 2 million risky Android apps were blocked from the Play Store last year
Fraud
Hackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates
an image of the Samsung Galaxy S24 Ultra
Samsung pulls curtains on classified operation called Project Infinity, where teams compete relentlessly to improve security on billions of Galaxy phones
Latest in Security
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
Latest in News
Apple iPhone 16 Plus
Apple officially delays the AI-infused Siri and admits, ‘It’s going to take us longer than we thought’
The Meta Quest Pro on its charging pad on a desk, in front of a window with the curtain closed
Samsung, Apple and Meta want to use OLED in their next VR headsets – but only Meta has a plan to make it cheap
AMD Ryzen 9000 3D chips
AMD officially announces price and release date for Ryzen 9 9900X3D and 9950X3D processors
Google Pixel 9
There's something strange going on with Google Pixel phone vibrations after the latest update
A masculine hand holding the Nvidia GeForce RTX 5070 Ti
Budget gamers rejoice as Nvidia RTX 5050 and RTX 5060 are rumored to launch in April
The Asus ROG Ally handheld gaming PC
AMD's new driver adds AFMF 2.1 support for improved frame generation - and it could be a game-changer for handheld gaming PCs