Analyzing Android Malware Workshop

From HOPE Wiki
Revision as of 16:33, 16 July 2022 by Maltman23 (talk | contribs)

Analyzing Android Malware; from triage to reverse engineering workshop

This workshop will be given:
   Day 2: Saturday, 23-July, 7:00pm - 11:00pm, in Workshop B (D'Angelo 306)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop B (D'Angelo 306).


Abstract

Android malware has become prevalent across the landscape. In this workshop Vitor Ventura will provide hands-on reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis, so that they can perform their own analysis without the use of automated tools. When everything else fails, knowing how the tools work under the hood provides the necessary knowledge to bypass the problems encountered. The attendees will learn, by doing it themselves, how to bypass the most common techniques used by malware to prevent analysis. The objective is that the attendees understand how they can use techniques like instrumentation and patching to help them analyze and bypass malware defenses when the automated tools fail, while using only free and open source tools.


Presenter(s)

Vitor Ventura


Full Description

full description text goes here


Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:


Required Software

any required software goes here


What Participants Should Bring to the Workshop (if anything)

any optional or required stuff to bring go here


Links

any links go here