Skip the navigation

What now, after the Android Market scare?

No screening process is going to be foolproof, but we can all take steps to make our devices safer

By Kenneth van Wyk
March 30, 2011 09:10 AM ET

Computerworld - I truly hate to say it, but it was inevitable that we'd see some maliciously inclined apps get introduced to the public through the Android Market or the Apple App Store.

As I described in my August 2010 column, it is exceedingly difficult to ensure the security of apps in a public store. As consumers, we seem to expect perfection, but that's just not realistic.

The recent spate of malware-infested apps found in the Android Market illustrates the point. Mistakes are going to happen, even if our app providers undertake reasonable precautions in guarding their stores.

And I should make it clear that I'm referring here to deliberate malicious behavior in the app software, not inadvertent mistakes made by application developers. Some of those inadvertent mistakes can be found via static code review of the apps themselves, and the store provider in its screening process may well detect some as well.

The question that we should be asking, then, is this: What do we have to protect us from apps containing deliberate malicious "features" such as Trojan horses that seek to steal sensitive information from us.

Let's consider both the store processes and the underlying security architectures briefly here. And let's compare Android and iOS in these considerations.

As for the stores, Apple of course is famous for having an app screening and approval process for all the apps in its App Store. Although not much is publicly known about that process, Apple does publish a set of guidelines for application developers to conform to (Note: You must be logged into the Apple Developer site to access the linked URL). Every iOS developer should read and be deeply familiar with those guidelines, of course, but they are hardly specific to security. In fact, the term "security" does not appear even once in the guidelines.

Still, a team of reviewers reviews all apps in the Apple App Store. Presumably, they verify many or all of the guidelines described in the above document. They verify that only published APIs are used, that the app doesn't crash and so on. Yet nothing is said about verifying that no undocumented features are present. Indeed, we have seen examples of approved apps containing "Easter eggs" and other undocumented features. (These apps were quickly pulled from the store, however, and Apple does famously have the ability to hit a software "kill switch," disabling such apps when discovered.)

By contrast, the Android Market is far less rigorous in its review processes. That's being charitable. The truth is that the market's operators pride themselves on being light on reviews. On the other hand, all apps must be signed, so in theory there is at least some accountability.



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!