Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
17
Malware threats, hoaxes, and taxonoMy
rmware or signed with a platform key. Since jSMSHider targeted
devices with a custom ROM, the customized image is normally signed
by publicly available private keys for the Android Open Source Project.
Since this malware was also signed by those keys, it can be success-
fully granted the INSTALL_PACKAGES permission. If the device
did not have a custom ROM, the malware would try to get permission
by attempting to acquire root with the su command: su –v. Once the
malware acquired the permission, the payload was loaded (testnew.
apk) as an embedded resource and quietly installed on the phone. is
payload would download and install a le named LcLottery.apk. e
payload would also process incoming or outgoing ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200