Join the next edition of our Key Researcher Talk Series!
ART-assisted App Diffing & Beyond: Security Applications of Android’s OAT Compiler
Android aims to provide a secure and feature-rich yet resource-saving platform for its applications. To satisfy these goals, the compilation to distributable packages shrinks and obfuscates the code by default. Additionally, in the latest Android versions applications are re-compiled to native code instead of executed in a virtual machine. We use this Android Runtime (ART) and its compiler as a novel approach to make Android application analysis more robust. On the one hand, our approach to binary diffing is more robust against standard bytecode shrinking and obfuscation. On the other hand, we are also exploring how the profile-guided compilation of ART can also enable other security applications, such as improving dynamic input generation methods.
14:00 – 14:10 Short Introduction by Edgar Weippl
14:10 – 14:30 Talk by Martina Lindorfer
14:30 – 15:00 Q&A
Please reach out to us at email@example.com if you would like to join. The talk will take place online.