Analyzing Android Malware Workshop: Difference between revisions
No edit summary |
No edit summary |
||
Line 29: | Line 29: | ||
== What Participants Should Bring to the Workshop (if anything) == | == What Participants Should Bring to the Workshop (if anything) == | ||
any optional or required stuff to bring go here | |||
== Links == | == Links == | ||
any links go here | any links go here |
Revision as of 16:33, 16 July 2022
Analyzing Android Malware; from triage to reverse engineering workshop
This workshop will be given:
Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)
NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop B (D'Angelo 306).
Abstract
Android malware has become prevalent across the landscape. In this workshop Vitor Ventura will provide hands-on reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis, so that they can perform their own analysis without the use of automated tools. When everything else fails, knowing how the tools work under the hood provides the necessary knowledge to bypass the problems encountered. The attendees will learn, by doing it themselves, how to bypass the most common techniques used by malware to prevent analysis. The objective is that the attendees understand how they can use techniques like instrumentation and patching to help them analyze and bypass malware defenses when the automated tools fail, while using only free and open source tools.
Presenter(s)
Vitor Ventura
Full Description
full description text goes here
Registration -- NOT required
You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:
Required Software
any required software goes here
What Participants Should Bring to the Workshop (if anything)
any optional or required stuff to bring go here
Links
any links go here