This commit is contained in:
parent
de9674f09c
commit
96b8d24b29
13 changed files with 26 additions and 24 deletions
|
@ -1,4 +1,4 @@
|
|||
#import "../lib.typ": num, todo, paragraph, SDK, APK, API, ART, DEX
|
||||
#import "../lib.typ": num, todo, paragraph, SDK, APK, API, ART, DEX, midskip
|
||||
#import "X_var.typ": *
|
||||
|
||||
== Shadow Attacks in the Wild <sec:cl-wild>
|
||||
|
@ -285,7 +285,7 @@ When looking at this new code stored in the field, we found that it does almost
|
|||
Thus, we believe that the developer has upgraded their obfuscation techniques, replacing a native library with inline base64 encoded bytecode.
|
||||
The shadow attack could be unintentional, but it strengthens the masking of the new implementation.
|
||||
|
||||
#v(2em)
|
||||
#midskip
|
||||
|
||||
As a conclusion, we observed that:
|
||||
- #SDK shadowing is performed by #shadowsdk of applications, but is unintentional: these classes are embedded for retro-compatibility purposes or because the developer added a library already present in Android.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue