<node id="677482">
  <nid>677482</nid>
  <type>news</type>
  <uid>
    <user id="34541"><![CDATA[34541]]></user>
  </uid>
  <created>1728666451</created>
  <changed>1729020337</changed>
  <title><![CDATA[Georgia Tech’s New Tool Can Detect Malware on Android Phones  ]]></title>
  <body><![CDATA[<p>Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.&nbsp;</p><p>Malware uses these accessibility tools to read screens and click on things it shouldn’t — with disastrous consequences, like transferring large sums of money from a banking app or even preventing the malware from being uninstalled. All it takes is a user clicking on a phishing link or downloading the wrong app on the Google Play Store to install malware on a phone. Then everything from cryptocurrency apps to rideshare apps that have credit cards stored in a virtual wallet become vulnerable.&nbsp;</p><p>Researchers at Georgia Tech have developed a new tool, Detector of Victim-specific Accessibility (DVa), that can check for malware. DVa runs on the cloud to check the phone for this malware, then sends the user a report of its findings that shows which apps are malware and how to delete them. It will also tell them which victim apps the malware was targeting and how to contact those companies to check for damages. DVa also sends a report to Google, so the company can attempt to eradicate this malware from apps.</p><p>“As we continue to design systems that are more and more accessible, we also need security experts in the room,” said <a href="https://saltaformaggio.ece.gatech.edu/">Brendan Saltaformaggio</a>, an associate professor in the School of&nbsp;<a href="https://scp.cc.gatech.edu/"> Cybersecurity and Privacy</a>&nbsp;(SCP) and the School of&nbsp;<a href="https://www.ece.gatech.edu/">Electrical and Computer Engineering</a>. “Because if we don't, they're going to get abused by hackers.”</p><p><strong>Modeling Malware</strong></p><p>To determine how vulnerable smartphones are to this type of hack, the team set up five Google Pixel phones and performed a malware analysis. The Georgia Tech researchers teamed up with Netskope — an industry leader in cloud, data, and network security — to help protect smartphones everywhere from this type of powerful malware. Then they installed some of the sample malware on each phone to see how it debilitated the system and used DVa to report this behavior.</p><p>While DVa can detect current attacks, the researchers note the challenge is ensuring that removing malware doesn’t remove accessibility.</p><p>“In the future, we need to look at how accessibility services work overall to figure out what's fundamentally different from a benign use and a malicious use,” said <a href="https://haichuanxuken.github.io/">Haichuan (Ken) Xu</a>, a Ph.D. student in SCP.&nbsp;</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2024-10-11T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Hackers are using accessibility features to hijack phones, but Georgia Tech researchers know how to stop it.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Hackers are using accessibility features to hijack phones, but Georgia Tech researchers know how to stop it.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="675295">
            <nid>675295</nid>
            <type>image</type>
            <title><![CDATA[PXL_20240815_142658886.MP_.jpg]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>258902</fid>
                  <filename><![CDATA[PXL_20240815_142658886.MP_.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2024/10/11/PXL_20240815_142658886.MP_.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2024/10/11/PXL_20240815_142658886.MP_.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Researchers at the conference. ]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tess Malone, Senior Research Writer/Editor</p><p>tess.malone@gatech.edu</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1214</item>
          <item>1188</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1214</item>
          <item>1188</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[News Room]]></item>
          <item><![CDATA[Research Horizons]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
