VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

The two most common methods for analysing potentially malicious files each have their shortcomings. Dynamic analysis only looks at what actually happens when the code is run and can thus be frustrated by anti-analysis techniques. Static analysis doesn’t have this shortcoming, but is hindered by obfuscation used in the file.

In a

paper

presented at VB2018 in Montreal,

Check Point

researchers Yoni Moses and Yaniv Mordekhay proposed a method that combines static and dynamic analysis to defeat obfuscation in

Android

apps. They tested it successfully on hundreds of both malicious and benign

Android

apps and concluded that, to research modern threats, a more holistic approach like this is needed.

Today we have published Yoni and Yaniv’s paper in both

HTML

and

PDF

format. We have also uploaded the video of their presentation to our

YouTube

channel.

VB-conference-paper.jpg
Android app deobfuscation using static-dynamic cooperation


Read the paper (HTML)


Download the paper (PDF)




Those interested in

Android

malware in general and anti-analysis methods in particular would do well to read

the paper

by

Google

researcher Maddie Stone, presented at the same conference.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *