ABSTRACT

Although anyone can learn to reverse engineering malware, a key differentiator in skill levels is often the ability to tackle the problem in a fast and efficient manner. All reversers could systematically reverse an application line by line, though this is not a scalable solution and leads to massive amounts of time wasted. The essential toolkit for reversing with speed will consist of at least baksmali, AXMLReader, and IDA Pro 6.5. Starting with an APK file, we are going to emulate what we might do when attacking any other binary: prepare the files for analysis and look for entry points or other points of interest.