Hunting Android Malware - A Novel Runtime Technique for Identifying Malicious Applications
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore a novel runtime technique for identifying malicious Android applications in this 43-minute conference talk from TROOPERS18. Delve into Android malware, app protection strategies, and analysis techniques while examining existing Android defenses. Discover the speaker's frustrations with current methods and learn about the innovative "Zoolander" solution. Gain insights into instrumentation, static analysis challenges, and the use of Java Docs. Witness a live demonstration of the victim app, snapshot attestation API, and understand the motivations behind this approach. Examine the GitHub implementation and discuss potential weaknesses of this malware hunting technique.
Syllabus
Introduction
Agenda
Android Malware
How do I protect my app
Malware analysis techniques
Android defenses
What were my frustrations
Zoolander
The Solution
Instrumentation
Demonstration
Limitations
Static Analysis
Frustrations
Java Docs
Victim App
Snapshot
attestation API
why did I do it
how I did it
demo
GitHub
Weaknesses
Taught by
WEareTROOPERS
Related Courses
Ethical Hacking for Mobile Phones, Facebook & Social Media!Udemy Android Security: Effective Permission Handling
Pluralsight Learning Mobile Device Security
LinkedIn Learning Securing Android Apps
LinkedIn Learning Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy