Главная
Study mode:
on
1
What I will talk about..
2
Obfuscation
3
Fast code analysis: example
4
Dynamic code loading
5
Monitoring extension
6
Mixed-environment code with JNI
7
Tracking Native Behavior:JNI
8
Tracking Native Behavior: LIBC
9
Tracking Native Behavior:BINDER
Description:
Explore a powerful new method for tracking and analyzing evasive Android malware behaviors without modifying the operating system. Learn techniques to overcome challenges in fast code analysis, environment detection, obfuscation, dynamic code loading, and anti-analysis measures. Discover how to monitor user-defined classes/methods, third-party libraries, Java/Android APIs, and native-level functions including JNI, libc, and Binder on unmodified devices. Gain insights into analyzing complex and advanced Android malware through demonstrations and practical examples.

Tracking App Behaviors With - Nothing Changed - Phone For Evasive Android Malware

Black Hat
Add to list