Computer scientists' anti-spyware app surpasses one million downloads

Apr 30, 2013
The app “SRT Appguard Pro” not only enables the user to see the threads at one glance, but also to revoke access permissions granted to suspicious apps.

"We considered such an app necessary. But we all were surprised by its actual success", explains Michael Backes, professor for Information Security and Cryptography at Saarland University and scientific director at the Center for IT-Security, Privacy and Accountability (CISPA). Last July, his spin-off Backes SRT provided the app as a free download. With "SRT Appguard" users can supervise apps they have already installed on the operating system Android and control their access permissions on resources like contact information and internet connection at any time. They do not have to be root to do this. "That is exactly what has not been possible with Android apps so far", declares Backes.

The facilities of SRT Appguard quickly attracted a lot of users. The download rate at the software registers of the German IT-portals "heise.de" and "chip.de" increased continually. In just six months 91,536 users downloaded the mini program and pushed it to 11th place in the category "Top 100 most popular apps in 2012". "If we add the balance of chip.de to the download numbers of our corporation website, we can see, that SRT Appguard has been downloaded over a million times by now", says Backes. In the meantime, the counter on chip.de stood at 178,272 and 93 percent of the users gave the app a thumbs up. The app was also available on the DVD that was included in around 230,000 copies of this year's January issue of the magazine.

Now, the new corporation offers a commercial version of the app. Since the beginning of April, "SRT Appguard Pro" can be found on the " Play" for 3,99 Euros. Soon, the in Saarbrücken will offer their app for the same price at "Samsung Apps". The South Korean company has invited Backes SRT to do so. One of the major assets of the commercial version over the is its improvement regarding ease-of-use, and the ability to support updates of monitored apps. A "risk score" graphically presents the danger of the current right-configuration for each app. "On this way we make it easier for the users to assess the potential danger on their smartphones and tablet PCs", explains Philipp von Styp-Rekowsky, chief technical officer of Backes SRT and doctoral candidate at Professor Backes' department.

He is assured that the importance of this will increase in the future. Furthermore, the app runs significantly faster and works on every version starting from version 2.3. The updating process of the installed apps also works. Within the first version, this wasn't possible.

Explore further: The new Candy Crush? Chinese language apps make learning a game

More information: www.srt-appguard.com/de/

Provided by University Saarland

3.7 /5 (3 votes)
add to favorites email to friend print save as pdf

Related Stories

Android users get malware with their apps

Mar 02, 2011

(PhysOrg.com) -- As new platforms make their way into the market there will always someone who is looking to exploit them for illegal or unethical ends. More proof of that fact has come today when Google was ...

Yahoo! helps find smartphone 'apps'

Jun 16, 2011

Yahoo! has begun helping people navigate the sea of applications available for Apple iPhones or mobile gadgets powered by Google-backed Android software.

Facebook Home off to slow start on Google Play

Apr 22, 2013

A little more than a week after being released, Facebook's new interface for Android smartphones, Facebook Home, has crossed the 500,000 mark for downloads on the Google Play application store.

Recommended for you

New app first to use gesture for language learning

Jan 29, 2015

While you might think a person shaking her phone or tablet from side to side is having issues with the device, she might actually be playing a game that has her mimicking a steering wheel motion as part of ...

Linux distrib vendors make patches available for GHOST

Jan 29, 2015

Qualys said on Tuesday that there was a serious weakness in the Linux glibc library. During a code audit, Qualys researchers discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.