Homework 3 - Case Study on Bypassing Simple Code Audits

This is the final case study of the quarter. It is due on the last day of classes: Tuesday June 9th, just before midnight.

The purpose of this case study is to look at how a malicious programmer might try to bypass simple code audits. This could allow a malicious app to be approved to the Apple, Android, or MS Windows app stores for example.

Before You Begin Reading The References

Write 1 to 2 paragraphs summarizing how you think a malicious programmer might bypass simple (e.g. quick) code audits. Use the techniques learned in class to theorize how this might occur.

The References

Read the following scholarly references on bypassing simple code audits and techniques to detect malicious apps that can be used along with simple code audits to provide more adequate coverage:

The Writeup

Turn in a writeup to Moodle that contains the following:
  1. Your 1-2 paragraphs that you wrote before reading the references
  2. A 1-2 paragraph summary of each of the four references
  3. Your responses to the following questions:
    1. Why is simple source code auditing ineffective at detecting malware? When answering, consider the techniques that the Jekyll app used to bypass the source code audit at the Apple Store.
    2. How do the additional techniques presented in the above references differ from source code auditing?
    3. What might a malicious programmer try to do in order to bypass the additional techniques?
  4. A 1-2 paragraph summary of why you think detecting malicious apps is difficult.