Page cover

Malware Detection

Protect your mobile app from risky and malicious apps with malware detection that identifies blacklisted apps, untrusted app stores, side-loaded apps, and dangerous permissions in real time.

Malware Detection provides active in-app protection against both known & zero-day malware, ongoing malware campaigns, counterfeit app clones, and other risky and suspicious apps that could compromise user data or your backend services. It evaluates applications, highlights high‑risk findings, and reports them back to your mobile app for real‑time security decisions and logging.

Combination of robust on-device Offline Scanning for Suspicious and Risky Apps with an optional online App Reputation API verifying findings against malware DB, allows you to balance privacy, performance, and coverage according to your risk model.

The online App Reputation API extension is fully optional: when disabled, the product works as a strictly on‑device scanner; when enabled, it upgrades your detection coverage by leveraging a live cloud malware database as an additional authoritative signal.

circle-info

Malware Detection Configurations Comparison

Feature
Offline Scanning
High-Confidence Online
High-Security Online

MD Subscription

Included

Extra

Extra

Suspicious & Risky Apps Detection

Scan using Malware DB via App Reputation API

Ideal For

The foundational layer engineered for apps needing to identify suspicious/risky apps (including zero-days) with permission-based risk scoring, hash/package blocklists, and selective scanning - all processed locally.

Recommended for set-and-forget mode for busy teams - fully automatic, no config. Leverages the App Reputation API for 0% false positives on known malware only, letting you confidently block critical actions without user friction.

Maximum protection for high-stakes environments like banking or payments. Combines API-verified malware detection with permission-based zero-day flagging. Best when you prefer highest security and can implement step-up auth or user confirmation flows.

Detection Method

✅ On-device (hash, package, permissions)

✅ App Reputation API

✅ App Reputation API + ✅ on-device methods

False Positive Risk

Low

0%

Very Low

Recommended Action

Warning, step-up auth, user confirmation

✅ Block, warning, step-up auth, user confirmation

✅ Block, warning, step-up auth, user confirmation

Network Required

No

Yes + Cached Results

Yes + Cached Results

App Selection

Configurable filtering by installation source

Configurable filtering by installation source

Configurable filtering by installation source

Zero-Day Coverage

Hash blocklist feature

Package-name blocklist feature

Permission-based detection feature

Remote Config

✅ Optional

✅ Optional

✅ Optional

1

Suspicious and Risky Apps Offline Scanning

In the default configuration, all analysis runs directly on the device, with no need for network connectivity and no app inventory data leaving the device.

What Makes It Different?

Android apps ecosystem and app distribution models allow cyber attackers to create Apps (usually with strong permissions) to intervene in other apps on the devices, implementing some steps of attack vectors on Apps of our customers. Such attacks could imply malicious activities such as making or accepting calls, sending or reading SMSs, reading the content of the screen, intervening in network communications, logging the inputs of the keyboard, and many other activities. Usually, such apps are created and distributed specifically to attack the given app, so the universal database of known malware becomes inefficient due to the ease of app hash permutations and re-distribution.

The offline scanning focuses on efficient, privacy‑preserving detection:

  • Smart app selection for optimized and fast scans

  • Hash blocklist check: Compares app hashes against a blocklist

  • Package-name blocklist check: Checks app package names against a blocklist

  • Malware scan scope: Select only apps that matter for your threat model. For example, exclude ones installed from trusted stores like a Google Play, default system apps and OEM-preinstalled ones.

  • Permission-based risk assessment: Evaluate both requested or granted permissions of each app and mark those using suspicious or over‑privileged combinations (e.g., read SMS, accessibility access, install packages).

  • Remote configuration (optional): Update your rules remotely as your needs evolve.

2

Hight-Confidence Online Malware Detection

The High-Confidence configuration uses optional online App Reputation API that connects your app to an up‑to‑date malware intelligence database. This configuration is based solely on the live malware and Virus DB, significantly reducing the risk of false positives.

Result Behavior

  • Only the app that is recognized as malware by the App Reputation API is flagged by the Talsec SDK.

Details

This configuration offers nearly 0% false-positive risk at the cost of security. The "Zero-Day" malware apps (unknown to the App Reputation API) are not considered harmful even if they require dangerous permissions, increasing the potential security implications. This option can be used without any additional modifications to the application logic (e.g., step-up authentication or in-app interaction with the end-user); the application can simply be blocked, with the rationale that malware is installed on the device.

3

High-Security Online Malware Detection

This High-Security configuration uses both permission-based assessment and an online App Reputation API to deliver the best results from a security perspective.

Result Behavior

  • If the application is recognized by the App Reputation API, the Talsec SDK automatically flags it.

  • If the app is unknown to the App Reputation API and requires dangerous permissions (configurable), it is also flagged by the Talsec SDK.

  • If the app requires dangerous permissions but is considered benign by the App Reputation API, the app is NOT flagged by the Talsec SDK, reducing the number of false positives.

Details

This configuration combines the benefits of the App Reputation API and permission-based classification. It also protects against "Zero-Day" malware — if a brand-new, sideloaded, unknown app requires dangerous permission, the SDK will flag it.

Even with the risk of false positives being reduced by the App Reputation API, it's not eliminated entirely. Because of that, this option expects an additional layer of countermeasures (step-up authentication) or in-app interaction with the end user to confirm that the flagged application is benign. The list of suspicious applications returned by the Talsec SDK also contains a reasoning for better classification.

circle-info

MalwareDetection is the more advanced premium commercial edition, while freeMalwareDetection is available as a free community alternative.

For pricing information and to request a demo, visit Talsecarrow-up-right.

Last updated