Главная
Study mode:
on
1
Intro
2
Agenda
3
Main Takeaway
4
Garbage Collector
5
destroy API
6
static secret
7
background
8
simple
9
dalvik to simple
10
flow droid
11
dummy main method
12
design overview
13
stringbuilder objects
14
instance fields
15
demo
16
static field
17
method bar
18
output format
19
power method
20
last users point
21
DEF set
22
Dataflow equations
23
Recap
24
Instance Field Approach
25
Reset Methods
26
Github repo
Description:
Explore a novel approach to securing sensitive data in Android applications through this AppSecUSA 2017 conference talk. Learn about Androsia, a tool that uses static program analysis techniques to identify and clear security-critical objects from memory immediately after their last use. Discover how this method provides defense in depth, protecting sensitive information even after a potential app compromise. Delve into the intricacies of data flow analysis, bytecode transformation, and the implementation of flow functions to detect Last Usage Points (LUP) of objects. Gain insights into leveraging the Soot framework for Java bytecode analysis and understand the inter-procedural summary-based analysis approach. Follow along as the speaker demonstrates the practical application of Androsia on Android apps, showcasing its potential to enhance mobile application security.

Androsia - A Tool for Securing In Memory Sensitive Data

OWASP Foundation
Add to list
0:00 / 0:00