Android Application Function Hooking with Xposed

BSidesROC 2016

Presented by: Jaime Geiger
Date: Saturday April 23, 2016
Time: 15:00 - 15:50
Location: Track 2

The Xposed Framework can be used to hook and replace Java methods in Android applications. This talk explores ways to take advantage of the framework for reverse engineering, fun, and (perhaps) even profit. Prior knowledge of Java and Android application programming recommended but not required!

Jaime Geiger

Jaime Geiger is a fourth year Computing Security student at the Rochester Institute of Technology. He is also a Security Consultant for Grimm, the company where he will be working for full time upon graduation as a JMF Vulnerability Engineer. He enjoys CTF’s, teaching people about security, and staring directly into the bits of whatever binaries he can get his hands on.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats