Reverse Engineering Android Native Libraries — by Terry Chia
SINCON 2020 Conference Insights Track
Day 2 (3 Jan 2021)
@ Main Stage
The Android Native Development Kit (NDK) allows Android app developers to implement parts of an Android application in C or C++. The NDK is commonly used to implement computationally intensive portions of an app, interface with libraries written in C or C++, or obfuscate sensitive functionality.
In this talk, we discuss how Android apps interface with native code as well as introduce tools and techniques to ease reverse engineering Android native libraries through automation. All the tools and techniques discussed in this talk will leverage open source tools, libraries and frameworks. This talk is targeted at people who have some reverse engineering experience but isn’t familiar with Android native applications.
About Terry Chia
TERRY CHIA is a security consultant at Centurion Information Security. He enjoys reverse engineering and fuzzing applications in his spare time.