Version 1.5.9e last one standing

Vortrag: Android DDI

Dynamic Dalvik Instrumentation of Android Applications and the Android Framework

Studio_table

As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique.

As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique.

Outline:
General Introduction
Background
Introduction to Android and Dalvik Applications
Introduction to Dynamic Instrumentation Basics (Native Code)
Introducing: Android DDI
Details
Tools
Examples
Real World Attack Example
Conclusions

Take Away:
This talk is highly technical, you will learn about new techniques for
analyzing and modifying Android applications. You will want to try out
what you saw in this talk.

Info

Tag: 29.12.2013
Anfang: 16:00 Uhr
Dauer: 01:00
Room: Saal 1
Track: Security & Safety
Sprache: en

Links:

Feedback

Uns interessiert deine Meinung! Wie fandest du diese Veranstaltung?