Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Runtime Riddles: Abusing Manipulation Points in the Android Source

DEFCONConference via YouTube

Overview

Explore advanced Android obfuscation techniques through runtime manipulation in this DEF CON 31 conference talk. Discover innovative methods for identifying manipulation targets within Android source code and learn to craft manipulators using native C++ and Java Native Interface (JNI). Gain insights into bypassing decompilers and emulators by altering standard application flow-of-control, including techniques to remove ClassLoader call traces typically required for Dalvik Executable (DEX) packing. Master the process of breaking cross-reference calculations in Android decompilers through practical demonstrations using a custom Android library for Android 13 devices. Follow along as the methodology for locating Java targets and modifying their native data structures is explained in detail, providing hands-on knowledge for runtime manipulation experimentation.

Syllabus

DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk

Taught by

DEFCONConference

Reviews

Start your review of Runtime Riddles: Abusing Manipulation Points in the Android Source

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.