EN FR
EN FR


Section: New Software and Platforms

OATs'inside

Keywords: Android - Malware - Reverse engineering - Code analysis

Functional Description: OATs’inside is a Android reverse engineering tool that handles all native obfuscation techniques. This tool uses a hybrid approach based on dynamic monitoring and trace-based symbolic execution to output control flow graphs (CFGs) for each method of the analyzed application. These CFGs spare users the need to dive into low-level instructions, which are difficult to reverse engineer.

  • Participants: Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong and Pierre Wilke

  • Contact: Pierre Graux