Skip to content
Nullcon Berlin

Reviving Abused Android Parcelables


Course
Upgrade subscription below

Dimitrios Valsamaras of Microsoft examines how Android Parcelables and class loaders enable object manipulation that breaks sandbox trust boundaries at scale.

Android applications rely heavily on Parcelables for inter-process communication, often assuming sandbox boundaries prevent malicious object manipulation. In practice, complex class loader behavior and unsafe trust assumptions allow attackers to inject, revive and modify objects originating outside an application's control. These weaknesses expose sensitive data flows, enable intent manipulation and create paths to privilege abuse.

By examining how custom objects move across application boundaries, this session clarifies why common defensive assumptions fail and how exploitation scales from small objects to deeply nested structures, thereby outlining practical defensive strategies that reduce exposure without breaking application functionality.

This session, led by Dimitrios Valsamaras, senior security researcher at Microsoft, will cover:

  • Scaling object manipulation from simple fields to large nested structures;
  • Exploitation risks tied to intent redirection and token leakage;
  • Secure design patterns for handling externally supplied objects.
 

 

Here is the course outline:

Reviving Abused Android Parcelables: Breaking Sandbox Assumptions at Scale

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button