Android Tamer

ClubHack 2011

2011/12/03

Abstract

Android is emerging as a leading mobile brand however, with rise of any system also rises the misuse, and so we need a security tool to keep a check on stuff.
This presentation will look at the available toolset for security professionals and will introduce some new combinations in a consolidated form of a VM environment. This will be a one stop tool required to perform any kind of operations on Android devices / applications / network, be it forensic evaluation or source code review or software security testing or customizing ROM with pre embedded stuff. everything is provided in a single package. More usages will include malware analysis along with review check of new applications inside a controlled environment. Environment will be bundled with eclipse, droiddraw, gingerbread source code. And most of the well known security tools in one single package. You can call it swiss army knife for android security.

Slides

Video

Part 1

Part 2

AI Generated Summary

This is the first public presentation about Android Tamer, delivered at ClubHack 2011. The talk introduces a comprehensive virtual machine environment designed as a “Swiss Army knife for Android security” - a one-stop tool for all Android security operations.

Key Topics Discussed

Android Market Context:

Why Security on Android is Needed:

Security Professional’s Point of View for Android:

The Problem:

Android Tamer Solution:

VM Background:

Comparison with Android Reverse Engineering Toolkit:

Personal Repository:

Application Pen Testing:

Menu Structure:

Malware Analysis:

ROM Analysis and Modification:

Development Tools:

Future Malware Landscape Prediction:

Key Features:

Key Insights:

Actionable Takeaways:

  1. Android market share is significant and growing - security is critical
  2. Mobile malware lifecycle will repeat PC malware lifecycle
  3. Need consolidated toolset for Android security operations
  4. VM approach provides isolated, pre-configured environment
  5. ROM analysis important - custom ROMs may contain malicious content
  6. Application traffic redirection is tricky - T-Proxy helps
  7. Certificate configuration needed for proxy-based testing
  8. Multiple decompilers available for different needs
  9. NDK may be future vector for malware
  10. Pre-configured bookmarks and paths save time

Ref: clubhack.com/2011/events/technical-briefings/#androidtamer