Mobile malware authors invest a lot of time and energy into code development to ensure their campaigns are successful. Attendees will also learn about these different campaigns and how the attacks are evolving.This evolution includes anti-emulator detection, antivirus suppression, chunked update downloads, etc. A list of analysis tools and resources used during the analysis will be provided at the end of the session.
Mobile malware authors invest a lot of time and energy into code development to ensure their campaigns are successful. Attendees will also learn about these different campaigns and how the attacks are evolving.This evolution includes anti-emulator detection, antivirus suppression, chunked update downloads, etc. A list of analysis tools and resources used during the analysis will be provided at the end of the session.
Grand Ballroom Borderless Cyber USA / Washington, D.C. / 8-10 October 2019 events@oasis-open.orgTechnical Issues?
If you're experiencing playback problems, try adjusting the quality or refreshing the page.
Questions for Speakers?
Use the Q&A tab to submit questions that may be addressed in follow-up sessions.