Laurie Kirk on Android Malware
When you use concrete representations of abstract syntax there is always redundancy that can be used to conceal malfeasance of one kind or another. But if all you know about computing are the concrete representations then this won't be obvious, but it appears here in the way the obfuscation works. The authors of this malware themselves used other concrete representations like BASE64 encoding that were easy enough to expose, ... That seems to be the basis of this "line of defence", .... it's not likely to end any time soon, IYAM ... See Weird Stuff and RP2040 - 6502 Emulator - TIM, Tiny Basic, and EHBasic
Subscribe to Strange Loop Conference.
Comments
Post a Comment