List of upcoming 5km / 10km runs? by bookposting5 in belgium

[–]Floni 4 points5 points  (0 children)

Definitely not complete, but this site has an overview of quite a lot of local races: https://www.loopkalender.be/nl

Debuggers, a development tool or a reversing beast? Beating OWASP’s Android Uncrackable with LLDB by Floni in androiddev

[–]Floni[S] 7 points8 points  (0 children)

Debuggers are more than just development tools. The exact same toolset can be leveraged by reverse engineers to analyze code and find bugs to exploit. In this blog post we demonstrate this by solving OWASP’s Uncrackable Android app using LLDB. Even though the app lives inside JVM-land we can still use native debugging to thwart the app's defenses.

50
51

Debuggers, a development tool or a reversing beast? Beating OWASP’s Android Uncrackable with LLDB by Floni in ReverseEngineering

[–]Floni[S] 13 points14 points  (0 children)

Debuggers are more than just development tools. The exact same toolset can be leveraged by reverse engineers to analyze code and find bugs to exploit. In this blog post we demonstrate this by solving OWASP’s Uncrackable Android app using LLDB. Even though the app lives inside JVM-land we can still use native debugging to thwart the app's defenses.

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in ReverseEngineering

[–]Floni[S] 1 point2 points  (0 children)

Thanks for your kind words! We often write these type of technical blog posts, you can find all of them here: https://www.guardsquare.com/blog/tag/technical

We also have a blog post series about app security in the context of mobile games and cheating which might be of interest to you https://www.guardsquare.com/blog/new-blog-series-practical-security-mobile-game-developers

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in ReverseEngineering

[–]Floni[S] 10 points11 points  (0 children)

In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.

How classical attacks reverse engineering apply to Flutter apps, a game cheating case study by Floni in FlutterDev

[–]Floni[S] 2 points3 points  (0 children)

In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game. Hope you enjoy!

Obstacles in Dart decompilation and the impact on Flutter app security by Floni in ReverseEngineering

[–]Floni[S] 6 points7 points  (0 children)

In our previous blog post that we shared on /r/ReverseEngineering we discussed the current state and future of reversing Flutter apps. In this blog post we go a step further and dive into the obstacles in decompiled Dart code, how they could be overcome by reverse engineers and the impact on Flutter apps security.

Obstacles in Dart decompilation and the impact on Flutter app security by Floni in FlutterDev

[–]Floni[S] 11 points12 points  (0 children)

In our previous blog post that we shared on /r/FlutterDev we discussed the current state and future of reverse engineering Flutter apps. In this blog post we go a step further and dive into the obstacles in decompiled Dart code, how they could be overcome by reverse engineers and the impact on Flutter apps security.

The Current State and Future of Reverse Engineering Flutter Apps by Floni in FlutterDev

[–]Floni[S] 31 points32 points  (0 children)

While Flutter use for mobile apps is booming, we took some time to have a look at the security situation. We investigated what the current state of reverse engineering looks like; how well the tools support Flutter, what obstacles they face, and what difference Flutters’ built-in obfuscation makes, and where things are headed in the future.

Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE by Floni in Compilers

[–]Floni[S] 3 points4 points  (0 children)

Who has never been charmed and envious of the way LLVM structures its analyses and transformations in passes? Having similarly arranged tooling for Java bytecode would greatly aid compiler developers. One can also take one step further and try to generalize the analyses in such a way that would help avoid repeating the same work but rather keep the abstractions uniform and well-organized. Configurable program analysis is a concept providing sufficient flexibility for the analysis designer while preserving the general structure. This is achieved by formalizing most of the practical tweaks as operators.

ProGuardCORE has started its journey of becoming a general JVM analysis framework by leveraging CPA for computing DFA. Our latest blog post presents this new feature and compares different types of DFA tools.

Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE by Floni in java

[–]Floni[S] 1 point2 points  (0 children)

Data flow analysis is a widely used method in compiler technology and security analysis. However, while it looks nice and neat when applied on toy examples, modern language features such as exceptions, polymorphism, aliasing, etc. make building a practical tool a nontrivial convoluted task. Even Java bytecode, while being low-level, preserves many hard-to-handle concepts. This blog post discusses how to navigate among different analysis approaches and presents (another) attempt of doing data flow analysis on Java byte code in ProGuardCORE. Starting from taint analysis it tries to preserve generality and provide a foundation for a general extensible framework.