Book description
This book documents the best tools and tactics available for analyzing Android malware. It explains how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how to use static analysis to break apart the application/malware using reverse engineering tools and techniques to re-create the actual code and algorithms used. The book includes access to an online library that supplies readers with tools to perform their own analysis of the latest Android malware threats.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- Acknowledgments
- Authors
- Conventions
- Chapter 1: Introduction to the Android Operating System and Threats (1/2)
- Chapter 1: Introduction to the Android Operating System and Threats (2/2)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (1/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (2/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (3/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (4/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (5/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (6/6)
- Chapter 3: Open Source Tools (1/4)
- Chapter 3: Open Source Tools (2/4)
- Chapter 3: Open Source Tools (3/4)
- Chapter 3: Open Source Tools (4/4)
- Chapter 4: Static Analysis (1/4)
- Chapter 4: Static Analysis (2/4)
- Chapter 4: Static Analysis (3/4)
- Chapter 4: Static Analysis (4/4)
- Chapter 5: Android Malware Evolution (1/2)
- Chapter 5: Android Malware Evolution (2/2)
- Chapter 6: Android Malware Trends and Reversing Tactics (1/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (2/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (3/3)
- Chapter 7: Behavioral Analysis (1/8)
- Chapter 7: Behavioral Analysis (2/8)
- Chapter 7: Behavioral Analysis (3/8)
- Chapter 7: Behavioral Analysis (4/8)
- Chapter 7: Behavioral Analysis (5/8)
- Chapter 7: Behavioral Analysis (6/8)
- Chapter 7: Behavioral Analysis (7/8)
- Chapter 7: Behavioral Analysis (8/8)
- Chapter 8: Building Your Own Sandbox (1/10)
- Chapter 8: Building Your Own Sandbox (2/10)
- Chapter 8: Building Your Own Sandbox (3/10)
- Chapter 8: Building Your Own Sandbox (4/10)
- Chapter 8: Building Your Own Sandbox (5/10)
- Chapter 8: Building Your Own Sandbox (6/10)
- Chapter 8: Building Your Own Sandbox (7/10)
- Chapter 8: Building Your Own Sandbox (8/10)
- Chapter 8: Building Your Own Sandbox (9/10)
- Chapter 8: Building Your Own Sandbox (10/10)
- Chapter 9: Case Study Examples (1/6)
- Chapter 9: Case Study Examples (2/6)
- Chapter 9: Case Study Examples (3/6)
- Chapter 9: Case Study Examples (4/6)
- Chapter 9: Case Study Examples (5/6)
- Chapter 9: Case Study Examples (6/6)
- Bibliography
- Back Cover
Product information
- Title: Android Malware and Analysis
- Author(s):
- Release date: October 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781482252200
You might also like
book
Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis …
book
Android Security
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses …
book
Intelligent Mobile Malware Detection
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out …
book
Windows Virus and Malware Troubleshooting
Make your PCs as secure as possible and limit the routes of attack and safely and …