Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hiding Behind Android Runtime - ART

Black Hat via YouTube

Overview

Explore advanced techniques for creating user mode rootkits in Android by leveraging the Android Runtime (ART) in this Black Hat conference talk. Dive deep into ART internals, examining file formats and mechanisms crucial for rootkit development. Learn how to circumvent modern Android security measures like verified boot by shifting focus from kernel mode to user mode. Discover methods for crafting rootkits, including what to modify, where to locate targets, and how to implement changes. Gain insights into persistence techniques and understand the limitations of this approach. Witness a live demonstration of an ART rootkit in action. Ideal for security researchers and Android developers seeking to enhance their understanding of potential vulnerabilities in the Android ecosystem.

Syllabus

Intro
Motivation
Background
Compilation
Quick Backend
Portable backend
Boot image
Layout
ART Image Header
OAT File
CAT Header
OAT Class Header
OAT Quick Method Header
Approach
Advantages
Persistence
Replacing framework code
Replacing app code
Limitations
Conclusion

Taught by

Black Hat

Reviews

Start your review of Hiding Behind Android Runtime - ART

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.