finish bg section
All checks were successful
/ test_checkout (push) Successful in 1m26s

This commit is contained in:
Jean-Marie Mineau 2025-08-27 00:35:07 +02:00
parent 19286eba61
commit eb35d092ac
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
10 changed files with 170 additions and 43 deletions

View file

@ -16,7 +16,7 @@ Among the notable tools in the #SDK, they are:
- `emulator`: an Android emulator.
This tools allow to run an emulated Android phone on a computer.
Although very usefull, Android emulator has several limitation.
Although very useful, Android emulator has several limitation.
For once, it cannot emulate another achitecture.
An x86_64 computer cannot emulate an ARM smartphone.
This can be an issue because a majority of smartphone run on ARM processor.
@ -55,7 +55,7 @@ In addition, it can perform additionnal analysis, like computing a call graph or
Jadx#footnote[https://github.com/skylot/jadx] is an application decompiler.
It convert #DEX files to Java source code.
It is not always capable of decompiling all classes of an application, so it cannot be used to recompile a new application, but the code generated can be verry helpfull to reverse an application.
It is not always capable of decompiling all classes of an application, so it cannot be used to recompile a new application, but the code generated can be very helpful to reverse an application.
In addition to decompilling #DEX files, Jadx can also decode Android manifests and application ressources.
=== Soot <sec:bg-soot>
@ -83,7 +83,7 @@ Malware might implement countermeasures that avoid running malicious payload in
#v(2em)
Those tools are quite usefull for manual operations.
Those tools are quite useful for manual operations.
However, considering the complexity of modern Android applications, it might take a lot of work for a reverse engineer to analyse one application.
In the next section, we will see more advance techniques that have been developped to analyse Android applications.