NorthSec 2021

Reversing Android malware for the Smart and Lazy
2021-05-20, 09:00–12:00, Workshops1

Android malware are packed and obfuscated. There are many ways to defeat this as a reverse engineer. Disassembly with Baksmali, Androguard, JADX etc is rewarding but long (and painful?). If you are just interested in the result (unpacked executable, non obfuscated), there are more efficient tools. In this workshop, hands-on lab will introduce you to Dexcalibur and House. You will unpack and de-obfuscate an Android malware in virtually no time (well, 3 hours for your first time :D).

Workshops only: Would you like to stream the workshop to an additional (passive) audience? – no Workshops only: What (if any) is the maximum number of participants you can support?


Workshops only: What should participants prepare for the workshop?

Before the workshop, it is recommended to

(1) Download and install Android Studio
(2) Setup an Android emulator x86_64 without Google Play

Other software will be installed during the workshop.

Ticket link

Streaming link

Have you given this talk/workshop before? If yes, please provide details and/or slides/video.

Not yet, but I am scheduled to do a longer training on Android RE for Ringzer0

Axelle is Principal Security Researcher at Fortinet. She has been working there for over 10 years on mobile malware and IoT malware. She is also the lead organizer of Ph0wn CTF, a CTF dedicated to smart objects, which takes place on the French Riviera.
In a previous life, Axelle worked on cryptography (implementation) and security protocols.