forked from strazzere/anti-emulator
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
14 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,17 @@ | ||
anti-emulator | ||
============= | ||
|
||
Android Anti-Emulator | ||
Android Anti-Emulator, originally presented at HitCon 2013: "Dex Education 201: Anti-Emulation" | ||
|
||
Purpose of this project was intended to show various was of detecting an emulated Android environment. Some of the methods are adapted from previously seen malware on other operating systems, others are just random thoughts. Slowly over time things have been added that I've either thought of randomly, stumbled upon or came across in the wild. I'll do my best to comment if anything from the wild is added directly to the project, as this would likely be more interesting to AV/researchers attempting to hide their own sandboxes. | ||
|
||
Contents | ||
-------- | ||
|
||
- slides/ - Talk slides | ||
- AntiEmulation/ - Eclipse project and main source of anti* code | ||
|
||
Disclaimer | ||
---------- | ||
|
||
This presentation and code are meant for education and research purposes only. Do as you please with it, but accept any and all responsibility for your actions. The tools were created specifically to assist in malware reversing and analysis - be careful. |