DJI - The ART of obfuscation
Study of an Android runtime (ART) hijacking mechanism for bytecode
injection through a step-by-step analysis of the packer used to protect the
DJI Pilot Android application.
Introduction
In the world of Android applications, it's not uncommon to come across
applications protected by a packer. The role of a packer is to protect all
or part of the application code from static analysis. There are many reasons
why a developer might want to protect an application:
Protect valuable business logic;
Pro...
Read more at blog.quarkslab.com