Chapter 6
Reverse Engineering Android Applications
In this chapter, we will cover malware basicshow to identify malware, malware behavior, and malware features. We will then discuss a custom Android BOT application created by the authors and demonstrate to the reader how potential malware can bypass Android built-in checks.
The Android BOT walkthrough will include stealing a users browser history and Short Message Service (SMS) as well as call logs, and it attempts to drain the phones battery. We will also present a sample application to show the readers how to reverse engineer or analyze malicious applications. After completing this chapter, the reader will be able to write Android BOT in Java. The reader will also become familiar with reverse ...
Get Android Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.