Hunting Android Malware - A Novel Runtime Technique for Identifying Applications
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore a groundbreaking research presentation on identifying malicious Android applications through runtime HEAP analysis. Delve into a novel technique that eliminates the need for APK access, offering a resource-efficient alternative to traditional malware detection methods. Discover how analyzing instantiated objects in the HEAP can effectively identify dangerous functionalities like DexClass loaders and other indicators of malicious behavior. Learn about the potential integration of this technique into the Android Attestation Framework as a system service, enabling real-time malware detection on Android devices. Gain insights into the current state of Android malware, existing detection techniques, and the limitations of static analysis and user-dependent identification methods.
Syllabus
16 - BruCON 0x0A - Hunting Android Malware: A novel runtime technique for identifying applications
Taught by
BruCON Security Conference
Related Courses
Enterprise and Infrastructure SecurityNew York University (NYU) via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Hacking Laboratuvarınızı Oluşturun
Udemy CISM Cert Prep: 3 Information Security Program Development and Management
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning