This commit is contained in:
parent
3b5df50248
commit
ca4e7703e1
6 changed files with 2781 additions and 623 deletions
|
|
@ -13,6 +13,6 @@ We show how these attacks can confuse the tools of the reverser when he performs
|
|||
The chapter is structured as follows.
|
||||
@sec:cl-loading investigates the internal mechanisms of class loading and presents how a reverser can be confused by these mechanisms.
|
||||
Then, in @sec:cl-obfuscation, we design obfuscation techniques and show their effect on static analysis tools.
|
||||
Next, @sec:cl-wild evaluates if these obfuscation techniques are used in the wild by scanning #nbapk APKs.
|
||||
Next, @sec:cl-wild evaluates whether these obfuscation techniques are used in the wild by scanning #nbapk APKs.
|
||||
@sec:cl-conclusion extends on the possible countermeasures against those shadow attacks, how they interact with other obfuscation techniques, as well as the limitations of this work and avenues left to explore.
|
||||
Finally, @sec:cl-conclusion concludes the chapter.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue