The research titled ‘How Did That Get In My Phone? Unwanted App Distribution on Android Devices’ has been published on SemanticsScholar website and shows the Google Play store is the primary source of malware installs on Android phones. The analysis includes data from 7.9 million apps from 12 million Android devices. It compares app downloads from the Play store, alternative markets, web browsers, from commercial PPI (pay-per-install) programs, from instant message, and seven other sources.
The Play store is the main aggregator of apps for Android devices and is home to countless apps and games. It was found that 87.2 percent of total app downloads on Android come from the Play store, but the sheer volume of downloads is also why 67.5 percent of installs for malicious apps come from it. The research states that the vector detection ratio (VDR) for the Play store is still the lowest compared to other sources of app installs.
“Its [Play store] VDR is only 0.6 percent, better than all other large distribution vectors. Thus, the Play market defenses against unwanted apps work, but still significant amounts of unwanted apps are able to bypass them, making it the main distribution vector for unwanted apps,” says the research.
Interestingly, unofficial alternate markets that had a total of 5.7 percent downloads had just over 10 percent unwanted installs. Installs from backups account for 2 percent of the total installs and 4.8 percent were unwanted. Installs from package installers account for 0.7 percent of the total and are responsible for 10.5 percent unwanted installs.
It was also noted that between 10 and 24 percent of user devices come across at least one unwanted app. Lastly, the research points out that app distribution via commercial PPI services on Android is significantly lower compared to Windows.
Which is the best TV under Rs. 25,000? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.