top of page
  • Writer's pictureInfosec In the City (IIC)

Reverse Engineering Android Native Libraries — by Terry Chia

SINCON 2020 Conference Insights Track


Day 2 (3 Jan 2021)

3pm—3.45pm

@ Main Stage



Abstract

The Android Native Development Kit (NDK) allows Android app developers to implement parts of an Android application in C or C++. The NDK is commonly used to implement computationally intensive portions of an app, interface with libraries written in C or C++, or obfuscate sensitive functionality.


In this talk, we discuss how Android apps interface with native code as well as introduce tools and techniques to ease reverse engineering Android native libraries through automation. All the tools and techniques discussed in this talk will leverage open source tools, libraries and frameworks. This talk is targeted at people who have some reverse engineering experience but isn’t familiar with Android native applications.


About Terry Chia

TERRY CHIA is a security consultant at Centurion Information Security. He enjoys reverse engineering and fuzzing applications in his spare time.

149 views0 comments
Post: Blog2_Post
bottom of page