Jean-Francois LALANDE


INSA Centre Val de Loire

  Title: Android malware reverse engineering


In this lab, we will focus on the reverse engineering process of Android malware. Recent malware try to hide their malicious behavior by delaying their malicious activities or loading dynamically attacker’s command and/or code. Participants will be guided through the process of understanding the basics about deploying an Android malware in a smartphone, auditing its activities, modifying its bytecode, in order to better observe a malware.


Jean-François Lalande received the Ph.D. degree in computer science from Inria, Sophia-Antipolis, France, within the Mascotte Project (CNRS/Inria/UNSA) in 2004. He is currently an Associate Professor with the INSA Centre Val de Loire, in the Laboratoire d’Informatique de l’Université d’Orléans (LIFO). During the Ph.D., his research interests focused on the combinatorial optimization for optical and satellite networks. Since 2005, he has mainly been working on security policies, security of operating systems, C­embedded software, and security of Android applications. Currently, he is mainly interested in mobile software security. J.-F. Lalande also  actively  participates  to  the  release  of open­source  software  in  order  to  make  security experiments reproducible.

Comments are closed.