Book description
This book documents the best tools and tactics available for analyzing Android malware. It explains how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how to use static analysis to break apart the application/malware using reverse engineering tools and techniques to re-create the actual code and algorithms used. The book includes access to an online library that supplies readers with tools to perform their own analysis of the latest Android malware threats.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- Acknowledgments
- Authors
- Conventions
- Chapter 1: Introduction to the Android Operating System and Threats (1/2)
- Chapter 1: Introduction to the Android Operating System and Threats (2/2)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (1/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (2/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (3/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (4/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (5/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (6/6)
- Chapter 3: Open Source Tools (1/4)
- Chapter 3: Open Source Tools (2/4)
- Chapter 3: Open Source Tools (3/4)
- Chapter 3: Open Source Tools (4/4)
- Chapter 4: Static Analysis (1/4)
- Chapter 4: Static Analysis (2/4)
- Chapter 4: Static Analysis (3/4)
- Chapter 4: Static Analysis (4/4)
- Chapter 5: Android Malware Evolution (1/2)
- Chapter 5: Android Malware Evolution (2/2)
- Chapter 6: Android Malware Trends and Reversing Tactics (1/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (2/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (3/3)
- Chapter 7: Behavioral Analysis (1/8)
- Chapter 7: Behavioral Analysis (2/8)
- Chapter 7: Behavioral Analysis (3/8)
- Chapter 7: Behavioral Analysis (4/8)
- Chapter 7: Behavioral Analysis (5/8)
- Chapter 7: Behavioral Analysis (6/8)
- Chapter 7: Behavioral Analysis (7/8)
- Chapter 7: Behavioral Analysis (8/8)
- Chapter 8: Building Your Own Sandbox (1/10)
- Chapter 8: Building Your Own Sandbox (2/10)
- Chapter 8: Building Your Own Sandbox (3/10)
- Chapter 8: Building Your Own Sandbox (4/10)
- Chapter 8: Building Your Own Sandbox (5/10)
- Chapter 8: Building Your Own Sandbox (6/10)
- Chapter 8: Building Your Own Sandbox (7/10)
- Chapter 8: Building Your Own Sandbox (8/10)
- Chapter 8: Building Your Own Sandbox (9/10)
- Chapter 8: Building Your Own Sandbox (10/10)
- Chapter 9: Case Study Examples (1/6)
- Chapter 9: Case Study Examples (2/6)
- Chapter 9: Case Study Examples (3/6)
- Chapter 9: Case Study Examples (4/6)
- Chapter 9: Case Study Examples (5/6)
- Chapter 9: Case Study Examples (6/6)
- Bibliography
- Back Cover
Product information
- Title: Android Malware and Analysis
- Author(s):
- Release date: October 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781482252200
You might also like
book
Android Security
Starting with an introduction to Android architecture and applications, this book covers security features and issues …
book
Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis …
book
Android Security Cookbook
Practical recipes to delve into Android’s security mechanisms by troubleshooting common vulnerabilities in applications and Android …
book
Hacking Android
Explore every nook and cranny of the Android OS to modify your device and guard it …