intro
All checks were successful
/ test_checkout (push) Successful in 1m9s

This commit is contained in:
Jean-Marie Mineau 2025-08-04 23:45:09 +02:00
parent 826c428114
commit f5145237ce
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
3 changed files with 78 additions and 28 deletions

View file

@ -164,10 +164,7 @@ GroddDroid~@abraham_grodddroid_2015 has the same approach but detect statically
Unfortuntely, exploring the application entirely is not always possible, as some applications will try to detect is they are in a sandbox environnement (#eg if they are in an emmulator, or if Frida is present in memory) and will refuse to run some sections of code if this is the case.
Ruggia #etal~@ruggia_unmasking_2024 make a list of evasion techniques.
They propose a new sandbox, DroidDungeon, that contrary to other sandboxes like DroidScope@droidscope180237 or CopperDroid@Tam2015, strongly emphasizes on resiliance against evasion mechanism.
#todo[RealDroid sandbox bases on modified ART?]
#todo[force execution?]
=== Hybrid Analysis <sec:bg-hybrid>
#todo[merge with other section?]
- #todo[DyDroid, audit of Dynamic Code Loading~@qu_dydroid_2017]
#todo[DyDroid, audit of Dynamic Code Loading~@qu_dydroid_2017]