DeepSec 2010: Android: Reverse Engineering and Forensics by Raphaël Rigo





The interactive transcript could not be loaded.


Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on May 10, 2012

Android: Reverse Engineering and Forensics

Raphaël Rigo, French Network and Information Security Agency (ANSSI)
While Android security architecture is now well understood and has been presented over and over, the details of actually reversing software running on it are scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.
Raphaël Rigo has been doing reverse engineering and computer security for about 10 years. He used to work for France Telecom R&D (until 2008), in the computer security research lab where his work mainly focused on embedded systems and operating systems security. This included reverse engineering and security analysis of embedded DSL routers, exploit writing and pentesting. He is now doing security pentests and security research (designing new tools or techniques) at ANSSI.


When autoplay is enabled, a suggested video will automatically play next.

Up next

to add this to Watch Later

Add to

Loading playlists...