2. WHO WE ARE
➤ alterakey
➤ Security Researcher
➤ iOS/Android Apps
➤ Android System
➤ Network
➤ ad3liae
➤ Security Researcher
➤ iOS Apps
➤ At Monolith Works Inc.
3. MOBILE APP SECURITY
➤ Attack Vectors
➤ Malicious App
➤ Malicious User
➤ Risks
➤ Vulnerabilities
➤ Unwanted Behaviors
4. FINDING VULNERABILITIES
➤ Static Analysis
➤ Reversing the target and deriving its behavior
➤ Reversing data flow is important
➤ Decompilers (such as JD-GUI) are essential tools
➤ Decompiling takes time
➤ Dynamic Analysis
➤ Running the target and seeing its behavior
5. PROBLEMS
➤ Dynamic Analysis
➤ Often unwanted :(
➤ Obfuscation
➤ Common practice
➤ Hinders decompilers
➤ What can we do?
6. RELATED WORKS
➤ Mixing multiple decompilers
(QARK et al.)
➤ Speed: even more time
➤ Fragility
➤ Mixing alone does not answer
the question, IMHO..
7. GO DIRECT
➤ Trueseeing
➤ Capable of
➤ Reversing data flow
➤ Loosely guessing constants/
typesets/…
➤ Manifest analysis (of
course)
➤ Uses no decompilers
➤ Speed
➤ Resiliency