FrankenDROID: Building and Dissecting Malicious APKs (session 1)

Presented at BSidesDC 2019, Oct. 26, 2019, 8:30 a.m. (240 minutes)

During this training session, attendees will get hands-on exposure to crafting and reverse engineering malicious Android applications using free tools. They will also learn how to leverage forensics techniques to gain access to vital information during data collection and analysis.


Presenters:

  • Jake Jeffers - Analyst at Capital One
    Jake Jeffers is a digital forensics analyst on the Cyber Technical Investigations team, responsible for the identification and investigation of malicious and non-malicious insider threats. His work experience includes roles as a local law enforcement investigator and digital forensics analyst, with specialization in mobile device forensics.
  • Luis Polio - Analyst at Capital One
    Luis Polio is an analyst on the Emerging Technology Security team where he is responsible for analyzing data to help protect Capital One customers and corporate network. His work experience includes Cybersecurity analyst roles, IT support specialist and mobile support. Luis Enjoys playing soccer, hiking, and spending time with friends and family.
  • Mark Schmidt - Analyst at Capital One
    Mark Schmidt is an analyst working on the Emerging Technology Security team where he is responsible analyzing data to he protect the Capital One network. With 3 years of experience in the cyber security field, Mark actually began his career in the infancy of the Capital One SOC in Mclean, VA. Prior to working for Capital One, Mark worked for the Dept. of State with the Defensive Equipment & Armored Vehicles division of Diplomatic Security. He enjoys diving, snowboarding, automotive fabrication and pc building.
  • Marita Fowler - Analyst at Capital One
    Marita Fowler is the team lead for the Emerging Technology Security team where she is responsible for the identification and analysis of technologically innovative malware threats to Capital One customers and the corporate network. Her work experience includes cybersecurity analyst roles within the Department of Homeland Security (DHS), Department of Defense (DoD), and financial sector.

Links:

Similar Presentations: