Finding Triggered Malice in Android Apps

  • Wednesday, March 2, 2016 | 10:20 AM – 11:10 AM | West | Room: 3018

View all Sessions

Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger is the mechanism that ensures that the code is only executed at the target. This talk will review how static analysis can be used to detect and leverage triggers for more robust detection.


This document was retrieved from on Sun, 18 Aug 2019 17:19:54 -0400.