Dear Colleagues,
Please register if you would like to attend this CHOOSE talk (and apero) tomorrow.
Kind regards,
Oscar Nierstrasz
---
Prof. Dr. O. Nierstrasz -- oscar(a)inf.unibe.ch
Software Composition Group -- http://scg.unibe.ch
University of Bern -- Tel +41 31 631 4618
> Begin forwarded message:
>
> From: Oscar Nierstrasz <oscar(a)inf.unibe.ch>
> Subject: [INF-all] CHOOSE Talk Tuesday Nov 15 -- Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
> Date: 8 November 2016 at 16:02:01 GMT+1
> To: <inf-staff(a)list.inf.unibe.ch>
>
>
> You are cordially invited to the following CHOOSE talk:
>
> Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
>
> Speaker: Steven Arzt
>
> Please register here: https://goo.gl/forms/lYnMhC5u0QPeoFpu2
>
> When: Tuesday Nov 15 @ 17h00-18h00
>
> The talk will be followed by a light aperitif.
>
> Where: University of Bern, Engehaldenstrasse 8, 3012 Bern, Room 001
>
> Abstract:
>
> Android malware is getting more and more sophisticated. So-called "sleeper" applications only trigger their malicious behavior after a certain time has passed or event has happened, effectively evading many dynamic analysis techniques. Other techniques include integrity checks as well as detectors for emulators, rooted devices, and hooks. If any such sign is detected, the malware refrains from its actual malicious behavior. For countering static analyses, these apps apply code encryption, packers, and code obfuscators. Together, these features render most automated analyses ineffective, leaving a manual analysis as the only viable option — a very difficult and time-consuming undertaking.
>
> To alleviate the problem, we propose CodeInspect, a new integrated reverse-engineering environment extending the Eclipse IDE and targeting sophisticated state-of-the-art malware apps for Android. CodeInspect not only features an interactive debugger that can work on the bytecode level, but also various static and dynamic analyses that support the human analyst. One can display data flows inside the app, check which permissions are used where in the code, what strings are computed or decrypted at runtime, which code is dynamically loaded and more. Reverse engineers can even add new Java source classes or projects into the application, which can then be called from the original app’s code. This is especially useful when implementing decryption methods which can be directly tested in place.
>
>
> Bio:
>
> Steven Arzt's core research topics are static and dynamic analysis of Java programs as well as applications on the Android mobile platform.
>
> He is one of the current maintainers of the Soot open-source program analysis framework. Soot is an ideal basis for developing static analyses for Android and Java application as well as for instrumenting these apps for runtime monitoring. Furthermore, he is the maintainer of the FlowDroid static data flow tracker which is used in various research projects around the world.
>
> This event is free for all SI-CHOOSE members. Non members are encouraged to join:
>
> http://www.s-i.ch/en/members/
>
>
>
> Kind regards,
> Oscar Nierstrasz
> ---
> Prof. Dr. O. Nierstrasz -- oscar(a)inf.unibe.ch
> Software Composition Group -- http://scg.unibe.ch
> University of Bern -- Tel +41 31 631 4618
>
>
>
> --
> CHOOSE News is a *moderated* mailing list for
> announcing non-commercial events related to
> Object Technology in Switzerland.
> To learn more about CHOOSE, see: http://www.choose.s-i.ch/
>
> _______________________________________________
> inf-staff mailing list
> inf-staff(a)list.inf.unibe.ch
> https://www.list.inf.unibe.ch/listinfo/inf-staff
You are cordially invited to the following CHOOSE talk:
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Speaker: Steven Arzt
Please register here: https://goo.gl/forms/lYnMhC5u0QPeoFpu2
When: Tuesday Nov 15 @ 17h00-18h00
The talk will be followed by a light aperitif.
Where: University of Bern, Engehaldenstrasse 8, 3012 Bern, Room 001
Abstract:
Android malware is getting more and more sophisticated. So-called "sleeper" applications only trigger their malicious behavior after a certain time has passed or event has happened, effectively evading many dynamic analysis techniques. Other techniques include integrity checks as well as detectors for emulators, rooted devices, and hooks. If any such sign is detected, the malware refrains from its actual malicious behavior. For countering static analyses, these apps apply code encryption, packers, and code obfuscators. Together, these features render most automated analyses ineffective, leaving a manual analysis as the only viable option — a very difficult and time-consuming undertaking.
To alleviate the problem, we propose CodeInspect, a new integrated reverse-engineering environment extending the Eclipse IDE and targeting sophisticated state-of-the-art malware apps for Android. CodeInspect not only features an interactive debugger that can work on the bytecode level, but also various static and dynamic analyses that support the human analyst. One can display data flows inside the app, check which permissions are used where in the code, what strings are computed or decrypted at runtime, which code is dynamically loaded and more. Reverse engineers can even add new Java source classes or projects into the application, which can then be called from the original app’s code. This is especially useful when implementing decryption methods which can be directly tested in place.
Bio:
Steven Arzt's core research topics are static and dynamic analysis of Java programs as well as applications on the Android mobile platform.
He is one of the current maintainers of the Soot open-source program analysis framework. Soot is an ideal basis for developing static analyses for Android and Java application as well as for instrumenting these apps for runtime monitoring. Furthermore, he is the maintainer of the FlowDroid static data flow tracker which is used in various research projects around the world.
This event is free for all SI-CHOOSE members. Non members are encouraged to join:
http://www.s-i.ch/en/members/
Kind regards,
Oscar Nierstrasz
---
Prof. Dr. O. Nierstrasz -- oscar(a)inf.unibe.ch
Software Composition Group -- http://scg.unibe.ch
University of Bern -- Tel +41 31 631 4618