Category: Android

22 articles
Date Tue 26 November 2019
Author Romain Thomas
Category Android

Analysis of Tencent Legu: a packer for Android applications.

Date Thu 14 November 2019
Author Tom Czayka
Category Android

This blog post presents a vulnerability which affects the widely installed Android web browser.

Date Mon 03 June 2019
Author Romain Thomas
Category Android

This blog post deals with QBDI and how it can be used to reverse an Android JNI library

Date Thu 16 May 2019
Authors Tom Czayka, Romain Thomas
Category Android

This blog post is about detecting modifications between genuine and repackaged applications.

Date Thu 02 May 2019
Author Tom Czayka
Category Android

This blog post is about examining an Android security patch and understanding how it mitigates the vulnerability.

Date Wed 24 April 2019
Authors Tom Czayka, Romain Thomas
Category Android

This blog post is about how to efficiently spot code mutations between distinct versions of an Android application.

Date Wed 27 March 2019
Author Romain Thomas
Category Android

This blog post is about techniques to disable Android runtime restrictions

Date Wed 25 July 2018
Author Francisco Falcon
Category Android

Earlier this year, on March 2018, we published a blog post detailing 2 vulnerabilities in the Android Bluetooth stack, which were independently discovered by Quarkslab, but were fixed in the March 2018 Android Security Bulletin while we were in the process of reporting them to Google.

Date Thu 22 March 2018
Author Francisco Falcon
Category Android

The March 2018 Android Security Bulletin includes fixes for 10 vulnerabilities in its Bluetooth stack, some of which were also independently discovered by Quarkslab, but were fixed while we were in the process of reporting them to Google (spoiler alert: we have reported a few more new Bluetooth vulnerabilities to the Android team — we'll disclose the details after they get fixed). This blogpost shows technical details for a couple of these fixed bugs, which can be triggered remotely and without any user interaction, as well as proof-of-concept code for them.

Date Thu 12 November 2015
Author André Moulu
Category Android

This article explains a recently disclosed vulnerability, independently discovered by the Google's Project Zero team and by Quarkslab some months ago. To our knowledge, this vulnerability was present, on all Samsung devices using Android 5, and allowed remote code execution as system user simply by browsing a website, by downloading an email attachment or via a malicious third party application with no permission.