Skip to content

Android Whitepapers

Jacob Soo edited this page Mar 9, 2014 · 64 revisions

Android Whitepapers

Title Notes Release Date Authors Links
Android Forensics Mobile Forensics World 2009 Andrew Hoog https://viaforensics.com/wpinstall/wp-content/uploads/2009/08/Android-Forensics-Andrew-Hoog-viaForensics.pdf
Exploratory Android Surgery Black Hat USA 2009 Jesse Burns http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-PAPER.pdf http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-SLIDES.pdf
Building Android Sandcastles in Android's Sandbox Black Hat Abu Dhabi 2010 Nils http://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-slides.pdf https://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-wp.pdf
Don't Root Robots BSides Detroit 2011 Jon Oberheide & Zach Lanier https://jon.oberheide.org/files/bsides11-dontrootrobots.pdf
A framework for on-device privilege escalation exploit execution on Android Sebastian Höbarth & Rene Mayrhofer http://www.mobilefactory.at/wordpress/wp-content/uploads/IWSSI2011-Android-Exploit-Framework-1.pdf https://www.mayrhofer.eu.org/downloads/presentations/2011-06-16_IWSSI_Android-Exploit-Framework.pdf
Popping Shell on A(ndroid)RM Devices BlackHat DC 2011 ITZHAK AVRAHAM https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham_ARM%20Exploitation-wp.2.0.pdf https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf
Yet Another Android Rootkit Black Hat Abu Dhabi 2011 Tsukasa Oi http://www.ffri.jp/assets/files/research/research_papers/yet-another-android-rootkit.pdf
Android: From Reversing to Decompilation Black Hat Abu Dhabi 2011 Anthony Desnos & Georoy Gueguen http://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf https://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf
Exploiting Androids for Fun and Profit HiTB KUL 2011 Riley Hassell http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf
Sleeping Android : Exploit through Dormant Permission Requests 28th August 2012 James Sellwood http://www.escapades-in-security.com/files/sleeping_android_release.pdf
Mobile Exploit Intelligence Project 19th April 2012 Dan Guido & Mike Arpaia http://www.trailofbits.com/resources/mobile_eip-04-19-2012.pdf https://media.blackhat.com/bh-eu-12/Guido/bh-eu-12-GuidoArpaia-Mobile_Exploit_Intelligence_Project.mp4
The Heavy Metal That Poisoned the Droid Black Hat Europe 2012 Tyrone Erasmus https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-WP.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-Slides.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy_Metal_That_Posioned_Droid.mp4
Dex Education: Practicing Safe Dex Black Hat USA 2012 26th July 2012 Tim Strazzere http://www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf
Cracking Open the Phone: An Android Malware Automated Analysis Primer RSA Conference 2012 Armando Orozco & Grayson Milbourne http://www.rsaconference.com/writable/presentations/file_upload/ht2-303.pdf
Deceiving Permissions - Rules for Android Malware Detection RSA Conference 2012 Vanja Svajcer http://www.rsaconference.com/writable/presentations/file_upload/mbs-210_svajcer.pdf
UI Redressing Attacks on Android Devices Black Hat Abu Dhabi 2012 Marcus Niemietz https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-slides.pdf https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf
Reducing the Window of Opportunity for Android Malware EICAR Conference May 2012 Axelle Apvrille & Tim Strazzere http://www.fortiguard.com/files/slidesdroid.pdf
Guns and Smoke to Defeat Mobile Malware HashDays 2012 November 2012 Axelle Apvrille http://www.fortiguard.com/files/hashdays.pdf
Playing Hide and Seek with Dalvik Executables Hacktivity 2013 Axelle Apvrille https://www.fortiguard.com/uploads/general/Hidex_Paper.pdf
Android Hax Jon Oberheide https://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf
Beating up on Android [Practical Android Attacks] Infiltrate 2011 Bas Alberts & Massimiliano Oldani http://www.infiltratecon.net/infiltrate/archives/Android_Attacks.pdf
Anatomy of a Remote Kernel Exploit Dan Rosenberg http://vulnfactory.org/research/h2hc-remote.pdf
PatchDroid: Scalable Third-Party Security Patches for Android Devices Collin Mulliner, Jon Oberheide, William Robertson & Engin Kirda http://www.mulliner.org/collin/academic/publications/patchdroid.pdf
Android OEM's applications (in)security and backdoors without permission Andre Moulu http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors-without-permission.pdf
Mapping & Evolution of Android Permissions CounterMeasure 2012 Zach Lanier & Andrew Reiter http://www.countermeasure2012.com/presentations/LANIER_REITER.pdf
Into The Droid - Gaining Access to Android User Data Defcon 2012 Thomas Cannon https://www.defcon.org/images/defcon-20/dc-20-presentations/Cannon/DEFCON-20-Cannon-Into-The-Droid.pdf
Nifty stuff that you can still do with Android HES 2013 2nd May 2013 Xavier 'xEU' Martin http://2013.hackitoergosum.org/presentations/Day1-05.Nifty%20stuff%20that%20you%20can%20still%20do%20with%20Android%20by%20Xavier%20Martin.pdf
Android: From Rooting to Pwning July 2013 Acexor http://hackmiami.org/wp-content/uploads/2013/07/AndroidSec.pdf
The Droid Exploitation SAGA RSA Asia-Pacific Conference 2013 ADITYA GUPTA & SUBHO HALDER https://www.rsaconference.com/writable/presentations/file_upload/mbs-t01_final_v2.pdf
How to Build a SpyPhone BlackHat USA 2013 Kevin McNamee https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-WP.pdf https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf
Lets Play Applanting BlackHat Europe 2013 Ajit Hatti https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-wp.pdf https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-slides.pdf
Off Grid communications with Android BlackHat Europe 2013 Josh Thomas https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-wp.pdf https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-slides.pdf
ANDROID: ONE ROOT TO OWN THEM ALL BlackHat USA 2013 Jeff Forristal https://media.blackhat.com/us-13/US-13-Forristal-Android-One-Root-to-Own-Them-All-Slides.pdf
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS BlackHat USA 2013 Daniel Peck https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-WP.pdf https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-Slides.pdf
Reversing and Auditing Android’s Proprietary Bits Recon 2013 23rd June 2013 Joshua J. Drake http://recon.cx/2013/slides/Recon2013-Joshua%20J.%20Drake-Reversing%20and%20Auditing%20Android's%20Proprietary%20Bits-public.pdf
Playing Hide and Seek with Dalvik Executables Hack.Lu 2013 October 2013 Axelle Apvrille https://www.fortiguard.com/uploads/general/Hidex_Slides.pdf
Abusing Dalvik Beyond Recognition Hack.Lu 2013 October 2013 Jurriaan Bremer http://archive.hack.lu/2013/AbusingDalvikBeyondRecognition.pdf
Android: Game of Obfuscation H2HC 2013 Jurriaan Bremer & Rodrigo Chiossi http://androidxref.com/files/bremer_chiossi_h2hc2013.pdf
Automated Analysis and Deobfuscation of Android Apps & Malware AthCon 2013 Jurriaan Bremer http://jbremer.org/wp-posts/athcon.pdf
Android DDI: Introduction to Dynamic Dalvik Instrumentation HiTB KUL 2013 October 2013 Collin Mulliner http://www.mulliner.org/android/feed/mulliner_dbi_hitb_kul2013.pdf
DEX EDUCATION 201 ANTI-EMULATION HITCON 2013 19th July 2013 Tim Strazzere http://hitcon.org/2013/download/Tim%20Strazzere%20-%20DexEducation.pdf
Mobile Analysis Kung Fu, Santoku Style RSA Conference 2014 Andrew Hoog & Sebastián Guerrero http://www.rsaconference.com/writable/presentations/file_upload/anf-w03-mobile-analysis-kung-fu-santoku-style_v2.pdf
Beginners Guide to Reverse Engineering Android Apps RSA Conference 2014 Pau Oliva Fora http://www.rsaconference.com/writable/presentations/file_upload/stu-w02b-beginners-guide-to-reverse-engineering-android-apps.pdf
Clone this wiki locally