ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

423 results

VideoLecturesChannel
Robust Android Malware Detection Against Adversarial Example Attacks

Authors: Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen.

7:57
Robust Android Malware Detection Against Adversarial Example Attacks

209 views

4 years ago

Engineering Community
Android APK Decompile and Analyze by Serhii Malofeiev (Eng)

We discussed the Reverse Engineering process and tools, and ways to protect our APKs. Was covered: adb shell; Apk Analyzer; ...

45:08
Android APK Decompile and Analyze by Serhii Malofeiev (Eng)

788 views

5 years ago

DFIRScience
Fast Android forensic triage with ALEAPP

Android forensics can take a long time to process. But if you just need a quick overview of the most common artifacts, check out ...

3:21
Fast Android forensic triage with ALEAPP

6,602 views

4 years ago

Rushi Mehta
How to Extract an Android APK || Simple Malware Analysis

Short video tutorial on how to extract the Android Package from the installed Application. Tools needed : APK Extractor Caution: ...

4:35
How to Extract an Android APK || Simple Malware Analysis

451 views

3 years ago

Coleman Kane
CS6038 2020: Week 13 Lec. 2 - Static Android Malware Analysis in Ghidra

https://class.malware.re/2020/04/22/android-analysis-part2.html A follow-up video lecture covering more advanced topics in ...

45:00
CS6038 2020: Week 13 Lec. 2 - Static Android Malware Analysis in Ghidra

4,696 views

5 years ago

NorthSec
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

The first commercially-available Android device was released in 2008. Despite its nearly 10-year public lifespan, the OS still ...

51:49
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

826 views

7 years ago

Coleman Kane
CS6038 2020: Week 13 Lec. 1 - Introduction to Android APK Apps and Simple Analysis

https://class.malware.re/2020/04/18/android-intro-and-tools.html This lecture reviews the Android app structure, and also ...

36:45
CS6038 2020: Week 13 Lec. 1 - Introduction to Android APK Apps and Simple Analysis

1,397 views

5 years ago

BSides Oslo
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

Have you ever wanted to see how Android malware work? How they are implemented? Which tools to use? This session is for ...

26:11
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

214 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - DOSfuscation Deobfuscation

Fireeye made a white paper on cmd.exe command obfuscation (DOSfuscation). We deobfuscate a malware sample that uses ...

13:31
Malware Analysis - DOSfuscation Deobfuscation

6,128 views

7 years ago

DEFCONConference
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware ...

30:37
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

49,643 views

5 years ago

Caleb Fenton
Android Deobfuscation - Tools and Techniques @TetCon2016

Sorry about the strange cuts. This was recorded on a phone that ran out of memory multiple times during recording! This is ~95% ...

42:14
Android Deobfuscation - Tools and Techniques @TetCon2016

3,554 views

9 years ago

DEFCONConference
DEF CON 21 - Craig Young - Android WebLogin Google's Skeleton Key

The PoC iterations and analysis results provide some insight into the state of Google's Bouncer and Android malware analysis at ...

23:28
DEF CON 21 - Craig Young - Android WebLogin Google's Skeleton Key

1,742 views

12 years ago

Paul Mc Quade
MRV#2 File Signatures - (Docs and Tools)

Malware Research Video #2 - File Signatures - (Docs) https://en.wikipedia.org/wiki/File_signature ...

2:39
MRV#2 File Signatures - (Docs and Tools)

196 views

3 years ago

Velimir Radlovački
Unboxing Android: Everything You Wanted To Know About Android Packers

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki To ...

32:03
Unboxing Android: Everything You Wanted To Know About Android Packers

137 views

6 years ago

Life Tech Mentor
An Introduction To Malware Analysis

A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...

40:31
An Introduction To Malware Analysis

124 views

5 years ago

Rahad Chowdhury
Android Application Vulnerability Scanner using MobSF

Android Application Vulnerability Scanner using MobSF | Rahad Chowdhury What is Android application vulnerability scanner?

19:06
Android Application Vulnerability Scanner using MobSF

6,443 views

3 years ago

botconf eu
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications

So the result of the analysis is the java code is a dropper trojanizing malicious android application it is heavily obfuscated and the ...

24:12
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications

334 views

5 years ago

LIFARS LLC
Quick Analysis of Remcos RAT in this Live Stream from LIFARS.com Malware Lab

See LIFARS.com Quick Analysis of Remcos RAT in this Live Stream from LIFARS Malware Lab. Remcos is a remote access tool ...

1:09
Quick Analysis of Remcos RAT in this Live Stream from LIFARS.com Malware Lab

1,613 views

5 years ago

OpenSecurityTraining2
Dynamic Malware Analysis D1P10 Isolated Malware Lab Setup

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter ...

26:47
Dynamic Malware Analysis D1P10 Isolated Malware Lab Setup

2,430 views

11 years ago

OWASP Foundation
Lorenzo Cavallaro - Keynote - Copper Droid On the Reconstruction of Android Malware Behaviors

From AppSecEU 2014 in Cambridge https://2014.appsec.eu/ Today mobile devices and their application marketplaces drive the ...

47:08
Lorenzo Cavallaro - Keynote - Copper Droid On the Reconstruction of Android Malware Behaviors

1,482 views

11 years ago