2021-05-20, 09:00–12:00, Workshops1
Android malware are packed and obfuscated. There are many ways to defeat this as a reverse engineer. Disassembly with Baksmali, Androguard, JADX etc is rewarding but long (and painful?). If you are just interested in the result (unpacked executable, non obfuscated), there are more efficient tools. In this workshop, hands-on lab will introduce you to Dexcalibur and House. You will unpack and de-obfuscate an Android malware in virtually no time (well, 3 hours for your first time :D).
35Workshops only: What should participants prepare for the workshop? –
Before the workshop, it is recommended to
(1) Download and install Android Studio
(2) Setup an Android emulator x86_64 without Google Play
Other software will be installed during the workshop.Ticket link – Streaming link – Have you given this talk/workshop before? If yes, please provide details and/or slides/video. –
Not yet, but I am scheduled to do a longer training on Android RE for Ringzer0
Axelle is Principal Security Researcher at Fortinet. She has been working there for over 10 years on mobile malware and IoT malware. She is also the lead organizer of Ph0wn CTF, a CTF dedicated to smart objects, which takes place on the French Riviera.
In a previous life, Axelle worked on cryptography (implementation) and security protocols.