Skip to content

Android Whitepapers

Jacob Soo edited this page Mar 9, 2014 · 64 revisions

Android Whitepapers

Title Notes Release Date Authors Links
Android Forensics Mobile Forensics World 2009 Andrew Hoog https://viaforensics.com/wpinstall/wp-content/uploads/2009/08/Android-Forensics-Andrew-Hoog-viaForensics.pdf
Don't Root Robots BSides Detroit 2011 Jon Oberheide & Zach Lanier https://jon.oberheide.org/files/bsides11-dontrootrobots.pdf
A framework for on-device privilege escalation exploit execution on Android Sebastian Höbarth & Rene Mayrhofer http://www.mobilefactory.at/wordpress/wp-content/uploads/IWSSI2011-Android-Exploit-Framework-1.pdf https://www.mayrhofer.eu.org/downloads/presentations/2011-06-16_IWSSI_Android-Exploit-Framework.pdf
Popping Shell on A(ndroid)RM Devices BlackHat DC 2011 ITZHAK AVRAHAM https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham_ARM%20Exploitation-wp.2.0.pdf https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf
Yet Another Android Rootkit Black Hat Abu Dhabi 2011 Tsukasa Oi http://www.ffri.jp/assets/files/research/research_papers/yet-another-android-rootkit.pdf
Android: From Reversing to Decompilation Black Hat Abu Dhabi 2011 Anthony Desnos & Georoy Gueguen http://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf https://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf
Exploiting Androids for Fun and Profit HiTB KUL 2011 Riley Hassell http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf
Sleeping Android : Exploit through Dormant Permission Requests James Sellwood 28th August 2012 http://www.escapades-in-security.com/files/sleeping_android_release.pdf
Mobile Exploit Intelligence Project 19th April 2012 Dan Guido & Mike Arpaia http://www.trailofbits.com/resources/mobile_eip-04-19-2012.pdf
Dex Education: Practicing Safe Dex Tim Strazzere http://www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf
Cracking Open the Phone: An Android Malware Automated Analysis Primer RSA Conference 2012 Armando Orozco & Grayson Milbourne http://www.rsaconference.com/writable/presentations/file_upload/ht2-303.pdf
Deceiving Permissions - Rules for Android Malware Detection RSA Conference 2012 Vanja Svajcer http://www.rsaconference.com/writable/presentations/file_upload/mbs-210_svajcer.pdf
Reducing the Window of Opportunity for Android Malware EICAR Conference May 2012 Axelle Apvrille & Tim Strazzere http://www.fortiguard.com/files/slidesdroid.pdf
Playing Hide and Seek with Dalvik Executables Axelle Apvrille https://www.fortiguard.com/uploads/general/Hidex_Paper.pdf
Android Hax Jon Oberheide https://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf
Beating up on Android [Practical Android Attacks] Infiltrate Bas Alberts & Massimiliano Oldani http://www.infiltratecon.net/infiltrate/archives/Android_Attacks.pdf
Anatomy of a Remote Kernel Exploit Dan Rosenberg http://vulnfactory.org/research/h2hc-remote.pdf
PatchDroid: Scalable Third-Party Security Patches for Android Devices Collin Mulliner, Jon Oberheide, William Robertson & Engin Kirda http://www.mulliner.org/collin/academic/publications/patchdroid.pdf
Android OEM's applications (in)security and backdoors without permission Andre Moulu http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors-without-permission.pdf
Mapping & Evolution of Android Permissions CounterMeasure 2012 Zach Lanier & Andrew Reiter http://www.countermeasure2012.com/presentations/LANIER_REITER.pdf
Into The Droid - Gaining Access to Android User Data Defcon 2012 Thomas Cannon https://www.defcon.org/images/defcon-20/dc-20-presentations/Cannon/DEFCON-20-Cannon-Into-The-Droid.pdf
Android: From Rooting to Pwning July 2013 Acexor http://hackmiami.org/wp-content/uploads/2013/07/AndroidSec.pdf
THE DROID EXPLOITATION SAGA RSA Asia-Pacific Conference 2013 ADITYA GUPTA & SUBHO HALDER https://www.rsaconference.com/writable/presentations/file_upload/mbs-t01_final_v2.pdf
How to Build a SpyPhone BlackHat USA 2013 Kevin McNamee https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-WP.pdf https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf
ANDROID: ONE ROOT TO OWN THEM ALL BlackHat USA 2013 Jeff Forristal https://media.blackhat.com/us-13/US-13-Forristal-Android-One-Root-to-Own-Them-All-Slides.pdf
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS BlackHat USA 2013 Daniel Peck https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-WP.pdf https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-Slides.pdf
Reversing and Auditing Android’s Proprietary Bits Recon 2013 23rd June 2013 Joshua J. Drake http://recon.cx/2013/slides/Recon2013-Joshua%20J.%20Drake-Reversing%20and%20Auditing%20Android's%20Proprietary%20Bits-public.pdf
Mobile Analysis Kung Fu, Santoku Style RSA Conference 2014 Andrew Hoog & Sebastián Guerrero http://www.rsaconference.com/writable/presentations/file_upload/anf-w03-mobile-analysis-kung-fu-santoku-style_v2.pdf
Beginners Guide to Reverse Engineering Android Apps RSA Conference 2014 Pau Oliva Fora http://www.rsaconference.com/writable/presentations/file_upload/stu-w02b-beginners-guide-to-reverse-engineering-android-apps.pdf
Clone this wiki locally