Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

One Step Before Game Hackers - Instrumenting Android Emulators

NorthSec via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Android emulator exploitation in this 26-minute conference talk from NorthSec. Dive into the intricacies of commercial Android emulators like NOX, BlueStacks, and Leidian, and learn how their root permissions and x86/ARM mixed-mode emulation impact game security. Discover the challenges faced by standard native hooking and DBI frameworks on these platforms. Gain insights into the process start routines for command-line and Android JNI applications, and understand how they differ in emulated environments. Compare emulation strategies across various emulators and runtime environments. Learn to develop a native hooking framework that overcomes the limitations of existing tools on mixed-mode emulators. Witness a live demonstration of game cheating using this custom framework, and explore the potential future of mobile game cheating in the dark market. Enhance your understanding of mobile game security and emulator vulnerabilities through this comprehensive exploration of Android emulator instrumentation.

Syllabus

Self Introduction
Agenda
Background: Game Cheating Threat Model
Background: Mobile Game Cheating Business Model
Background: Purpose
Targets
Command Line Binary
Java Application
Init Houdini
Houdini License
Existing Hooking Framework
Normal Approach
(A) Utilize Houdini
(B) Utilize Xposed
Conclusion

Taught by

NorthSec

Reviews

Start your review of One Step Before Game Hackers - Instrumenting Android Emulators

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.