Abstract
As mobile manufacturers and app developers have upped their game, so too have malware authors. This paper discusses Malware techniques like embedding VM’s, dynamic code instrumentation, dex class loading, exploiting user application vulnerabilities for information extraction, sandbox escaping and privilege escalations in android eco-system. The speaker has developed POC ‘s/ Code Examples that uses the above techniques to hide itself from Google / Anti-virus scanners. Using anti-malware and self-integrity checks, it tries to prevent static and dynamic analysis.