Execution Tracing of Telegram on Android for Time Travel Analysis

Execution Tracing of Telegram on Android for Time Travel Analysis

Learn how to capture and record Telegram’s behavior on Android using full-system and lightweight tracing.

By eShard

Select date and time

Wednesday, June 18 · 8 - 9am PDT

Location

Online

About this event

  • Event lasts 1 hour

We’re recording Telegram from the inside to understand how to capture execution traces the right way.

In this live session, you’ll learn how to set up the Telegram app on an Android system, when exactly to hit record, and how to prepare the data for Time Travel Analysis.

We’ll walk through three real actions inside the app:

  • sending a message in Secret Chat,
  • sending a video file,
  • and sending a sticker.

There are two tracing methods we’ll use: full-system and lightweight tracing.
Can you already guess which applies to which?

Join us and find out.

Frequently asked questions

Will this session show how to exploit Telegram?

No. This session focuses only on the recording phase, how to capture execution traces for later analysis, not exploitation.

What kind of tools will be used?

We’ll use esReverse with both full-system emulation and lightweight tracing (Frida, Qiling, etc.).

Will I get access to the recording afterward?

The webinar will be recorded, and we'll share details on accessing resources after the event.

Can I ask questions during the session?

Yes! You can ask questions in the chat during the session and we’ll answer them live at the end.

Organized by