DAMN - A Debugging and Manipulation Tool for Android Applications

Gerald Schoiber, Rene Mayrhofer, Michael Hölzl

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

Abstract

Mobile developers tend to use source code obfuscation to protect their code against reverse engineering. Unfortunately, some developers rely on the idea that obfuscated applications also provide additional security. But that is not the case since mistakes in design are still present and can be used for arbitrary attacks. However, manually analyzing such obfuscated applications is time consuming for researchers due to the complexity of the generated code. Our debugging and manipulation tool (DAMN) offers a new way of investigating Android applications, including obfuscated ones. It combines static source code reversing with dynamic manipulation techniques to get rid of obfuscation penalties and supports the investigator during the analyzing process. DAMN can display the reversed source code, pause any application at any given time and allows to manipulate its state. All those features make DAMN a powerful reversing and analyzing tool for manual investigations of obfuscated Android applications.

OriginalspracheEnglisch
Titel14th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2016 - Proceedings
Redakteure/-innenBessam Abdulrazak, Matthias Steinbauer, Ismail Khalil, Eric Pardede, Gabriele Anderst-Kotsis
Herausgeber (Verlag)ACM Press
Seiten40-44
Seitenumfang5
ISBN (elektronisch)9781450348065
ISBN (Print)978-1-4503-4806-5
DOIs
PublikationsstatusVeröffentlicht - 28 Nov. 2016
Veranstaltung14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016) - Singapore, Singapur
Dauer: 28 Nov. 201630 Nov. 2016
http://www.iiwas.org/conferences/momm2016/

Publikationsreihe

NameACM International Conference Proceeding Series

Konferenz

Konferenz14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016)
Land/GebietSingapur
OrtSingapore
Zeitraum28.11.201630.11.2016
Internetadresse

Schlagwörter

  • Android
  • Code Analysis
  • Debugging
  • Reverse Engineering

Fingerprint

Untersuchen Sie die Forschungsthemen von „DAMN - A Debugging and Manipulation Tool for Android Applications“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren