{"id":223054,"date":"2025-06-29T04:16:10","date_gmt":"2025-06-29T04:16:10","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/223054\/"},"modified":"2025-06-29T04:16:10","modified_gmt":"2025-06-29T04:16:10","slug":"uncovering-new-ways-to-detect-vault-apps-on-smartphones","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/223054\/","title":{"rendered":"Uncovering new ways to detect vault apps on smartphones"},"content":{"rendered":"<p>            <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/06\/hide-and-seek-uncoveri.jpg\" alt=\"Hide and seek: Uncovering new ways to detect hidden apps on smartphones\" title=\"Example call graph of a simple Android app. Credit: Future Internet (2025). DOI: 10.3390\/fi17050186\" width=\"800\" height=\"530\"\/><\/p>\n<p>                Example call graph of a simple Android app. Credit: Future Internet (2025). DOI: 10.3390\/fi17050186<\/p>\n<p>Researchers have discovered a modern solution to <a href=\"https:\/\/www.mdpi.com\/1999-5903\/17\/5\/186\" target=\"_blank\" rel=\"noopener\">detect vault applications<\/a> (apps) on smartphones, which could be a game-changer for law enforcement. The paper is published in the journal Future Internet.<\/p>\n<p>The analysis, led by researchers from Edith Cowan University (ECU) and University of Southern Queensland, demonstrates that machine learning (ML) can be used to effectively identify <a href=\"https:\/\/techxplore.com\/tags\/vault\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">vault<\/a> apps.<\/p>\n<p>Smartphones are an integral part of daily life, used by an estimated 5 billion people around the world.<\/p>\n<p>With the growing concern for digital privacy, vault apps are becoming increasingly popular, providing users with secure storage by encrypting files and hiding their presence in the smartphone system.<\/p>\n<p>ECU Associate Professor and <a href=\"https:\/\/techxplore.com\/tags\/cyber+security\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">cyber security<\/a> expert Mike Johnstone said while these apps can be used for legitimate purposes, they are regularly associated with <a href=\"https:\/\/techxplore.com\/tags\/illegal+activity\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">illegal activity<\/a>.<\/p>\n<p>&#8220;Content hiding\u2014or vault apps\u2014allow users to hide files, messages and even entire apps behind additional layers of encryption,&#8221; Associate Professor Johnstone said. &#8220;This could be for very good reasons, such as securing personal photos, files or sensitive information.<\/p>\n<p>&#8220;However, they may also facilitate espionage, enable unauthorized spying and support a wide range of malicious activities that compromise user privacy and security.&#8221;<\/p>\n<p>Associate Professor Johnstone said vault apps are not easily identified by existing detection systems.<\/p>\n<p>&#8220;These apps can look and behave like their normal equivalents, which can make them hard to identify,&#8221; he said.<\/p>\n<p>&#8220;Conventional methods of detection also require prior knowledge of which apps are classified as improper\u2014so it makes things difficult if you don&#8217;t already know which apps to look for.<\/p>\n<p>&#8220;This is a key challenge for smartphone forensics, making it difficult for police to investigate crimes.&#8221;<\/p>\n<p>Researchers found that they could effectively identify vault apps by using ML, with significant accuracy on Android phones.<\/p>\n<p>&#8220;This research shows a better way, by using machine learning to spot vault apps without the need for a fixed list or database that must be constantly updated,&#8221; Associate Professor Johnstone said. &#8220;Our findings reveal that it is entirely possible to detect an Android vault app with 98% accuracy.&#8221;<\/p>\n<p>With this level of accuracy, Associate Professor Johnstone said this method could be extremely valuable for <a href=\"https:\/\/techxplore.com\/tags\/law+enforcement+agencies\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">law enforcement agencies<\/a>.<\/p>\n<p>&#8220;This approach could be instrumental for law enforcement in their efforts to address this critical issue,&#8221; he said. &#8220;Given the popularity of phones, any approach that is non-invasive and accurate would be of use.&#8221;<\/p>\n<p>Associate Professor Johnstone said the next phase of research will involve additional algorithms, a larger sample size, investigating whether it will work for non-Android devices, as well as the use of vault apps by cyber criminals.<\/p>\n<p><strong>More information:<\/strong><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tMichael N. Johnstone et al, Using Machine Learning to Detect Vault (Anti-Forensic) Apps, Future Internet (2025). <a data-doi=\"1\" href=\"https:\/\/dx.doi.org\/10.3390\/fi17050186\" target=\"_blank\" rel=\"noopener\">DOI: 10.3390\/fi17050186<\/a><\/p>\n<p>                                                Provided by<br \/>\n                                                                                                    <a href=\"https:\/\/techxplore.com\/partners\/edith-cowan-university\/\" target=\"_blank\" rel=\"noopener\">Edith Cowan University<\/a><br \/>\n                                                    \t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"icon_open\" href=\"http:\/\/www.ecu.edu.au\/\" target=\"_blank\" rel=\"nofollow noopener\"><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a><\/p>\n<p>\n                                                <strong>Citation<\/strong>:<br \/>\n                                                Hide and seek: Uncovering new ways to detect vault apps on smartphones (2025, June 27)<br \/>\n                                                retrieved 29 June 2025<br \/>\n                                                from https:\/\/techxplore.com\/news\/2025-06-uncovering-ways-vault-apps-smartphones.html\n                                            <\/p>\n<p>\n                                            This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no<br \/>\n                                            part may be reproduced without the written permission. The content is provided for information purposes only.\n                                            <\/p>\n","protected":false},"excerpt":{"rendered":"Example call graph of a simple Android app. Credit: Future Internet (2025). DOI: 10.3390\/fi17050186 Researchers have discovered a&hellip;\n","protected":false},"author":2,"featured_media":223055,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3159],"tags":[3295,3292,3293,477,1302,3294,547,53,16,15],"class_list":{"0":"post-223054","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-computer-news","9":"tag-hi-tech-news","10":"tag-hitech","11":"tag-information-technology","12":"tag-innovation","13":"tag-inventions","14":"tag-mobile","15":"tag-technology","16":"tag-uk","17":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114764721907475524","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/223054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=223054"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/223054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/223055"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=223054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=223054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=223054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}