Statistical Deobfuscation of Android Applications
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a conference talk on statistical deobfuscation techniques for Android applications presented at CCS 2016. Delve into the research conducted by Benjamin Bichsel, Veselin Raychev, Petar Tsankov, and Martin Vechev from ETH Zurich. Learn about their innovative system, its underlying mechanisms, and the use of Probabilistic Graphical Models in the deobfuscation process. Discover the implementation details and examine the experimental results that demonstrate the effectiveness of their approach. Gain insights into this cutting-edge research that addresses the challenge of reverse engineering obfuscated Android apps, presented at the 23rd ACM Conference on Computer and Communications Security held at Hofburg Palace in Vienna, Austria.
Syllabus
Introduction
Release of the system
How does it work
Probabilistic Graphical Models
Implementation
Experiments
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube