Explore a detailed security research presentation from Black Hat that delves into the vulnerabilities of Java's ClassLoader mechanism in Android applications. Learn how the fundamental component responsible for dynamically loading classes can be exploited by malicious actors to create "evil twin" instances of classes from other applications. The 33-minute talk by Dimitrios Valsamaras, Senior Security Researcher at Microsoft, demonstrates how third-party applications can craft and dispatch parcelable Java objects with malicious content to other applications without requiring any permissions. Understand the security implications when developers place undue trust in Java objects received from untrusted sources, particularly when dealing with Serializable and Parcelable objects. Through practical examples, discover how the practice of storing application resources and code in world-readable directories enables attackers to "borrow" the context of another app, potentially leading to unpredicted behavior and serious security vulnerabilities. This presentation emphasizes the necessity for more vigilant security practices in Android application development.
Overview
Syllabus
My other ClassLoader is your ClassLoader: Creating evil twin instances of a class
Taught by
Black Hat