“ This clone attempt beat a austere terror to all peregrine political platform , in particular Android . ” research worker from Adana Science and Technology University in Turkey and the National University of Science and Technology in Islamabad , Pakistan , unveil their findings utmost hebdomad in a cover . engender through DroidMorph , with an norm sensing order of 51.4 percentage for family morph , 58.8 percent for method morph , and 54.1 pct for eubstance morph notice across all syllabus . The investigator plan to ADD promote bemusement at unlike point every bit wellspring as enable morph of metadata entropy such as permit encode in an APK Indian file as set out of their future tense do work in monastic order to abridge espial range . Unlike iOS , Android twist countenance drug user to download apps from one-third - company root , kindle the risk of infection of unwitting substance abuser installing unverified and lookalike apps that clon the functionality of lawful apps but are intentional to magic trick exploiter into download apps laced with fraudulent cypher equal to of thieving tender selective information . The researcher produce DroidMorph , a shaft that leave Android diligence ( APKs ) to be “ morph ” by decompiling the charge to an mediate class , which is and then modify and compose to produce ringer , both benign and malware , to quiz and assess the resiliency of commercially useable anti - malware product against this assail . The investigator learn that 8 out of 17 prima commercial anti - malware programme break down to detect any of the clone applications programme in a examination employ 1,771 morph APK var. “ Malware author utilization cover genetic mutation ( morph / mystification ) to acquire malware ringer on a perpetual footing , foiling catching by touch - based detector , ” the investigator tote up . moreover , malware writer can enjoyment this technique to reach many clon of the varlet software program with varied storey of abstractedness and obfuscation to obscure their dead on target intent and bring forth past anti - malware railway locomotive ’ defensive structure barrier . morph could come at several spirit level , concord to the research worker , let in those that want qualify the category and method make in the beginning inscribe or something more coordination compound that vary the political platform ’s murder hang , such as the shout chart and master - stream chart . LineSecurity , MaxSecurity , DUSecurityLabs , AntivirusPro , 360Security , SecuritySystems , GoSecurity , and LAAntivirusLab are among the anti - malware application program that have been successfully sidestep .