Automated Third-Party Library Detection for Android Applications - Are We There Yet?
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a comprehensive conference talk on automated third-party library detection for Android applications. Delve into the current state of TPL detection tools, their effectiveness, and challenges faced in the field. Learn about various detection processes, tool comparisons, and selection criteria. Examine issues like complicated package structures and multidex problems. Gain insights into theory-based comparisons, obfuscation-resilient capabilities, and installation processes. Discover valuable lessons learned and conclusions drawn from this in-depth analysis of TPL detection in Android app development.
Syllabus
Intro
Background
Various TPL detection tools
The goals
Related work Search
The state-of-the-art TPL detection tools
TPL detection process
Tool Comparison
Tool Selection
Effectiveness
Complicated package structure
Multidex Problem
Efficiency
Theory-based comparison
Obfuscation-resilient Capability
Installation
Lessons Learned
Conclusion
Taught by
Association for Computing Machinery (ACM)
Related Courses
Android Penetration TestingYouTube OWASP TOP 10 Mobile - Riesgos de las aplicación móviles
Udemy Android Penetration Testing
Udemy Exploiting Android Messengers with WebRTC
nullcon via YouTube Securing Webviews and The Story Behind CVE-2021-21136
Hack In The Box Security Conference via YouTube