INSA Centre Val de Loire
Title: Android malware reverse engineering
In this lab, we will focus on the reverse engineering process of Android malware. Recent malware try to hide their malicious behavior by delaying their malicious activities or loading dynamically attacker’s command and/or code. Participants will be guided through the process of understanding the basics about deploying an Android malware in a smartphone, auditing its activities, modifying its bytecode, in order to better observe a malware.
Jean-François Lalande received the Ph.D. degree in computer science from Inria, Sophia-Antipolis, France, within the Mascotte Project (CNRS/Inria/UNSA) in 2004. He is currently an Associate Professor with the INSA Centre Val de Loire, in the Laboratoire d’Informatique de l’Université d’Orléans (LIFO). During the Ph.D., his research interests focused on the combinatorial optimization for optical and satellite networks. Since 2005, he has mainly been working on security policies, security of operating systems, Cembedded software, and security of Android applications. Currently, he is mainly interested in mobile software security. J.-F. Lalande also actively participates to the release of opensource software in order to make security experiments reproducible.