Laurie Kirk on Android Malware

When you use concrete representations of abstract syntax there is always redundancy that can be used to conceal malfeasance of one kind or another. But if all you know about computing are the concrete representations then this won't be obvious, but it appears here in the way the obfuscation works. The authors of this malware themselves used other concrete representations like BASE64 encoding that were easy enough to expose, ... That seems to be the basis of this "line of defence", .... it's not likely to end any time soon, IYAM ... See Weird Stuff and RP2040 - 6502 Emulator - TIM, Tiny Basic, and EHBasic

Subscribe to Strange Loop Conference.

Comments

Popular posts from this blog

Live Science - Leonardo da Vinci's Ancestry

David Turner Obituary by Sarah Nicholas Fri 24 Nov 2023