Blog | G5 Cyber Security

Black Hat Asia 2015: Target: Malware

Malware commonly turns to API-wrapping techniques to obfuscate API calls, which makes it difficult to reverse-engineer the code. API Deobfuscator: Identifying Runtime-Obfuscated API Calls via Memory Access Analysis will detail just such a scheme, which can generate maps between obfuscated API calls and their true invocations. Android’s become another hot frontier in the fight against malware, and static and dynamic analysis tools have been created in response to Android malware’s increasingly complex defensive measures.”]

Source: https://www.darkreading.com/black-hat/black-hat-asia-2015-target-malware/d/d-id/1319228

Exit mobile version