Course Overview
Learning Objectives
ARM Instruction set (includes updates from ARMv9)
iOS and Android Security Model
Setting up your own Malware Research Environment
Corellium for Malware Research
Understand how jailbreaks and exploits are written
Reversing Objective-C, Swift, Java, Kotlin, and Smali code
Reversing Native Android and iOS Binaries
Frida for Runtime Analysis
Advanced Frida Techniques (Advanced Memory Inspection, Custom Tracing and Profiling, Inspecting Real-world applications using Frida)
Case Study of Public Malware (Pegasus, Cerberus, MasterFred, etc.)
Case Study of Custom Malware designed for the course
iOS and Android Forensics Techniques
Inspecting Crash Logs
Extraction and Analysis of Forensic Artifacts
Conclusion and Future Research
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):