YoVDO

Hunting Android Malware - A Novel Runtime Technique for Identifying Applications

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Mobile Security Courses Malware Detection Courses

Course Description

Overview

Explore a groundbreaking research presentation on identifying malicious Android applications through runtime HEAP analysis. Delve into a novel technique that eliminates the need for APK access, offering a resource-efficient alternative to traditional malware detection methods. Discover how analyzing instantiated objects in the HEAP can effectively identify dangerous functionalities like DexClass loaders and other indicators of malicious behavior. Learn about the potential integration of this technique into the Android Attestation Framework as a system service, enabling real-time malware detection on Android devices. Gain insights into the current state of Android malware, existing detection techniques, and the limitations of static analysis and user-dependent identification methods.

Syllabus

16 - BruCON 0x0A - Hunting Android Malware: A novel runtime technique for identifying applications


Taught by

BruCON Security Conference

Related Courses

Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
The Complete Cyber Security Course : End Point Protection!
Udemy
Máster en Seguridad Informática. Curso completo de Hacking.
Udemy
Network Analysis with Arkime
Pluralsight
Configuring Firepower Threat Defense (FTD) Integrations
Pluralsight