Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Ultrawide Archaeology on Android Native Libraries - Security Analysis and Vulnerability Assessment

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 40-minute conference talk from the Chaos Communication Congress (38C3) that delves into an accidental massive-scale investigation of Android native libraries. Learn how a simple scraper script bug led to downloading native libraries from approximately 8 million Android applications across various markets, unveiling widespread vulnerability issues. Follow along as speakers Luca Di Bartolomeo and Rokhaya Fall share their journey through scraping challenges, IP-ban evasion techniques, binary similarity analysis methods, and their discoveries about the state of security patching in the Android ecosystem. Discover insights from their comprehensive study covering Play Store scraping, Androzoo scraping, Maven repository analysis, and the unexpected consequences of database management assumptions, all while debunking myths about Android developers' approach to security updates and vulnerability management.

Syllabus

38C3 - Ultrawide archaeology on Android native libraries

Taught by

media.ccc.de

Reviews

Start your review of Ultrawide Archaeology on Android Native Libraries - Security Analysis and Vulnerability Assessment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.