Results for jni

Threat Research

VB 2013 - Day 2

This post is the second in a three part series. Click here for Part 1 and here for Part 3 Many Android talks on the 2nd day of VB2013! Actually, the importance of mobile threats is something everybody has observed here, and Helen Martin even started the conference mentioning the fact. What a difference compared to conferences 2 or 3 years ago! Rowland Yu - GinMaster : a case study in Android malware In America or Europe, people often tend to think that malware are only "important" if found in Google Play. Rowland however stated an important...

By Axelle ApvrilleOctober 11, 2013

Threat Research

11MB for a simple conference program application?

As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conference, with the agenda, paper abstracts and a few news. Figure 1. IEEE Security & Privacy Android application Curious, I downloaded the application for Android ( and ran it through my automated analysis scripts. When the following warnings popped up, I initially wondered if I hadn't downloaded a Trojan: Tue May 21 07:19:02 2013...

By Axelle ApvrilleJuly 30, 2012