Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

K9Qs8W7XC2g/default.jpg

I will discuss each of the techniques the malware author used in order to prevent reverse engineering of their Android native library including manipulating the Java Native Interface, encryption, run-time environment checks, and more. This talk discusses not only the techniques the malware author implemented to prevent analysis, but also the steps and process for a reverse engineer to proceed through the anti-analysis traps.

By Maddie Stone

Full Abstract & Presentation Materials: https://www.blackhat.com/us-18/briefi...

K9Qs8W7XC2g/default.jpg
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library Reviewed by Anonymous on August 27, 2018 Rating: 5