We are going to release a tool for automated runtime memory analysis for mobile apps (IOS & Android). All the existing tools are not working with runtime memory analysis processes preferring to dump and analyze memory after app finish it’s execution.
Our idea is to gather information during runtime to be able to track changes of the state and application behavior with the final goal being to simplify reverse engineering of obfuscated code. We also made a single interface to manage this process and automated some most common checks that should be done during penetration test.
LOCATION: TRACK 2
DATE: July 25, 2020
TIME: 05:00 PM - 06:00 PM (GMT +8)
Got a question for our speakers or just want to chat? Join us on Discord!