Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tracking App Behaviors With - Nothing Changed - Phone For Evasive Android Malware

Black Hat via YouTube

Overview

Explore a powerful new method for tracking and analyzing evasive Android malware behaviors without modifying the operating system. Learn techniques to overcome challenges in fast code analysis, environment detection, obfuscation, dynamic code loading, and anti-analysis measures. Discover how to monitor user-defined classes/methods, third-party libraries, Java/Android APIs, and native-level functions including JNI, libc, and Binder on unmodified devices. Gain insights into analyzing complex and advanced Android malware through demonstrations and practical examples.

Syllabus

What I will talk about..
Obfuscation
Fast code analysis: example
Dynamic code loading
Monitoring extension
Mixed-environment code with JNI
Tracking Native Behavior:JNI
Tracking Native Behavior: LIBC
Tracking Native Behavior:BINDER

Taught by

Black Hat

Reviews

Start your review of Tracking App Behaviors With - Nothing Changed - Phone For Evasive Android Malware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.