Analyzing Android Malware Workshop: Difference between revisions

From HOPE Wiki
No edit summary
No edit summary
Line 29: Line 29:


== What Participants Should Bring to the Workshop (if anything) ==
== What Participants Should Bring to the Workshop (if anything) ==
text goes here
any optional or required stuff to bring go here




== Links ==
== Links ==
any links go here
any links go here

Revision as of 16:33, 16 July 2022

Analyzing Android Malware; from triage to reverse engineering workshop

This workshop will be given:
   Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop B (D'Angelo 306).


Abstract

Android malware has become prevalent across the landscape. In this workshop Vitor Ventura will provide hands-on reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis, so that they can perform their own analysis without the use of automated tools. When everything else fails, knowing how the tools work under the hood provides the necessary knowledge to bypass the problems encountered. The attendees will learn, by doing it themselves, how to bypass the most common techniques used by malware to prevent analysis. The objective is that the attendees understand how they can use techniques like instrumentation and patching to help them analyze and bypass malware defenses when the automated tools fail, while using only free and open source tools.


Presenter(s)

Vitor Ventura


Full Description

full description text goes here


Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:


Required Software

any required software goes here


What Participants Should Bring to the Workshop (if anything)

any optional or required stuff to bring go here


Links

any links go here