DiscoverBlack HatUnpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

Update: 2018-08-28
Share

Description

I will discuss each of the techniques the malware author used in order to prevent reverse engineering of their Android native library including manipulating the Java Native Interface, encryption, run-time environment checks, and more. This talk discusses not only the techniques the malware author implemented to prevent analysis, but also the steps and process for a reverse engineer to proceed through the anti-analysis traps.

By Maddie Stone

Full Abstract & Presentation Materials: https://www.blackhat.com/us-18/briefings/schedule/index.html#unpacking-the-packed-unpacker-reverse-engineering-an-android-anti-analysis-native-library-10795
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

Black Hat