Главная
Study mode:
on
1
Introduction
2
Android
3
Background on Android
4
Houdini
5
Houdini Uses
6
How Houdini Works
7
Houdini Explanation
8
Houdini Shared Object
9
Android Native Bridge
10
Android x86 Project
11
Java Native Interface
12
Native Bridge RuntimeCallbacks
13
Initialize Load Library
14
Native Code
15
Native Bridge
16
Memory
17
Memory Map
18
Execution Loop
19
Decompile
20
Processor State
21
Syscalls
22
Detection
23
Escape to x86
24
Rwx pages
25
Sidechannel code execution
26
Detection and analysis
27
Malware behavior
28
Recommendations
29
Static Analysis
30
Conclusion
31
Disclosure Timeline
32
Special Thanks
Description:
Explore Intel's proprietary Houdini binary translator, used in Android on x86 platforms, in this 36-minute conference talk from Ekoparty 2021's Hardware Hacking Space. Delve into the high-level workings and loading process of Houdini, followed by an in-depth examination of its low-level internals and memory model. Discover security weaknesses introduced by Houdini and learn methods to escape its environment, execute arbitrary ARM and x86 code, and create Houdini-targeted malware that evades existing platform analysis. Gain insights from security consultant Brian Hong's expertise in hardware penetration testing, reverse engineering, and embedded systems security.

Sleight of ARM- Demystifying Intel Houdini - Brian Hong - Ekoparty 2021- Hardware Hacking Space

Ekoparty Security Conference
Add to list