Android Malware and Analysis

Book description

This book documents the best tools and tactics available for analyzing Android malware. It explains how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how to use static analysis to break apart the application/malware using reverse engineering tools and techniques to re-create the actual code and algorithms used. The book includes access to an online library that supplies readers with tools to perform their own analysis of the latest Android malware threats.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. Acknowledgments
  7. Authors
  8. Conventions
  9. Chapter 1: Introduction to the Android Operating System and Threats (1/2)
  10. Chapter 1: Introduction to the Android Operating System and Threats (2/2)
  11. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (1/6)
  12. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (2/6)
  13. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (3/6)
  14. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (4/6)
  15. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (5/6)
  16. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (6/6)
  17. Chapter 3: Open Source Tools (1/4)
  18. Chapter 3: Open Source Tools (2/4)
  19. Chapter 3: Open Source Tools (3/4)
  20. Chapter 3: Open Source Tools (4/4)
  21. Chapter 4: Static Analysis (1/4)
  22. Chapter 4: Static Analysis (2/4)
  23. Chapter 4: Static Analysis (3/4)
  24. Chapter 4: Static Analysis (4/4)
  25. Chapter 5: Android Malware Evolution (1/2)
  26. Chapter 5: Android Malware Evolution (2/2)
  27. Chapter 6: Android Malware Trends and Reversing Tactics (1/3)
  28. Chapter 6: Android Malware Trends and Reversing Tactics (2/3)
  29. Chapter 6: Android Malware Trends and Reversing Tactics (3/3)
  30. Chapter 7: Behavioral Analysis (1/8)
  31. Chapter 7: Behavioral Analysis (2/8)
  32. Chapter 7: Behavioral Analysis (3/8)
  33. Chapter 7: Behavioral Analysis (4/8)
  34. Chapter 7: Behavioral Analysis (5/8)
  35. Chapter 7: Behavioral Analysis (6/8)
  36. Chapter 7: Behavioral Analysis (7/8)
  37. Chapter 7: Behavioral Analysis (8/8)
  38. Chapter 8: Building Your Own Sandbox (1/10)
  39. Chapter 8: Building Your Own Sandbox (2/10)
  40. Chapter 8: Building Your Own Sandbox (3/10)
  41. Chapter 8: Building Your Own Sandbox (4/10)
  42. Chapter 8: Building Your Own Sandbox (5/10)
  43. Chapter 8: Building Your Own Sandbox (6/10)
  44. Chapter 8: Building Your Own Sandbox (7/10)
  45. Chapter 8: Building Your Own Sandbox (8/10)
  46. Chapter 8: Building Your Own Sandbox (9/10)
  47. Chapter 8: Building Your Own Sandbox (10/10)
  48. Chapter 9: Case Study Examples (1/6)
  49. Chapter 9: Case Study Examples (2/6)
  50. Chapter 9: Case Study Examples (3/6)
  51. Chapter 9: Case Study Examples (4/6)
  52. Chapter 9: Case Study Examples (5/6)
  53. Chapter 9: Case Study Examples (6/6)
  54. Bibliography
  55. Back Cover

Product information

  • Title: Android Malware and Analysis
  • Author(s): Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
  • Release date: October 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781482252200