Michele Roviello
Last known affiliation: Cleafy
Bio: Michele Roviello is a cybersecurity professional with experience in malware analysis and threat intelligence. He has specialized in reverse engineering Windows and Android malware, gaining deep insights into malicious operations and behaviors. He has also worked as a penetration tester, and has been actively involved in digital forensics and incident response. Currently, he is a Malware Analyst at Cleafy, where he focuses on analyzing and mitigating emerging mobile cyber threats.
Federico Valentini 🗣 | Alessandro Strino 🗣 | Michele Roviello 🗣
Abstract (click to view)
Understanding Android malware can initially feel daunting and disorienting, but with a solid foundation of knowledge and a touch of automation, the process becomes much easier. This workshop teaches participants the essential concepts required to analyze Android malware effectively. The knowledge gained here can be applied to other security domains, such as malware detection, classification, and automation. By attending, participants will develop technical expertise and gain a deeper understanding of the techniques and methodologies commonly used in malware analysis. Another key goal of this workshop is to delve into the analyst’s mindset, helping attendees adopt the critical thinking and problem-solving approach required for reverse engineering tasks.
Designed for both aspiring analysts and those with intermediate experience, this workshop emphasizes the development of critical thinking and systematic problem-solving approaches essential for effective reverse engineering. Participants will analyze prominent malware families, including Toxic Panda, DroidBot, Bingomod, etc.. through a combination of static and dynamic analysis techniques enhanced by practical Python scripting and Frida instrumentation.
The workshop will have a final challenge (a hands-on exercise) featuring a custom malware sample designed specifically for attendees. This final challenge allows participants to apply all the techniques demonstrated during the training session. The analysis is guided by a series of questions, encouraging deeper exploration and problem-solving as participants progress. In classic challenge fashion, the ultimate goal is to uncover a hidden flag.
With its blend of practical exercises, technical insights, and real-world applications, this workshop offers a comprehensive and engaging introduction to Android malware analysis. It empowers participants to tackle similar challenges confidently in their cybersecurity journey.
