wip
All checks were successful
/ test_checkout (push) Successful in 51s

This commit is contained in:
Jean-Marie 'Histausse' Mineau 2025-07-16 16:01:35 +02:00
parent 655bff8de2
commit e6c8b0ee6c
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
9 changed files with 28 additions and 14 deletions

View file

@ -60,7 +60,7 @@ Because ART will give priority to the internal version of the class, the version
Such shadow attacks are more difficult to detect by a reverser, that may not know the existence of this specific hidden class in Android.
]
=== Impact on static analysis tools <sec:cl-evaltools>
=== Impact on Static Analysis Tools <sec:cl-evaltools>
#figure(
```java
@ -248,7 +248,7 @@ In addition to the data flow in hidden classes, Flowdroid needs a list of data s
We believe that analysis tools can handle shadow attacks to some degree.
The implementation of the solution will differ depending on the nature tool and may not always require the same implementation effort.
=== Relation with obfuscation techniques <sec:cl-cross-obf>
=== Relation with Obfuscation Techniques <sec:cl-cross-obf>
As described in the state of the art, reverse engineers face other techniques of obfuscation such as packers or native code.
These techniques rely on custom class loaders that load new parts of the application from ciphered assets or from the network.