This commit is contained in:
parent
655bff8de2
commit
e6c8b0ee6c
9 changed files with 28 additions and 14 deletions
|
@ -60,7 +60,7 @@ Because ART will give priority to the internal version of the class, the version
|
|||
Such shadow attacks are more difficult to detect by a reverser, that may not know the existence of this specific hidden class in Android.
|
||||
]
|
||||
|
||||
=== Impact on static analysis tools <sec:cl-evaltools>
|
||||
=== Impact on Static Analysis Tools <sec:cl-evaltools>
|
||||
|
||||
#figure(
|
||||
```java
|
||||
|
@ -248,7 +248,7 @@ In addition to the data flow in hidden classes, Flowdroid needs a list of data s
|
|||
We believe that analysis tools can handle shadow attacks to some degree.
|
||||
The implementation of the solution will differ depending on the nature tool and may not always require the same implementation effort.
|
||||
|
||||
=== Relation with obfuscation techniques <sec:cl-cross-obf>
|
||||
=== Relation with Obfuscation Techniques <sec:cl-cross-obf>
|
||||
|
||||
As described in the state of the art, reverse engineers face other techniques of obfuscation such as packers or native code.
|
||||
These techniques rely on custom class loaders that load new parts of the application from ciphered assets or from the network.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue