Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
56
android Malware and analysis
some are less secure than others being inherently less robust or prone to
possible abuse such as collisions or other types of attacks.
On a practical level, an Android malware analyst should be iden-
tifying and searching for MD5, SHA1, and SHA256 values as these
are the values most commonly blogged about or found in common
data sets at the time of the writing of this book. As such, performing
search engine queries for all such values may help discover additional
information, abuse reports, samples, dates of a related incident and
more. A large number of tools exist to generate hash values of inter-
est, such as MD5SUM included in default installations of the Ubuntu
operating system.
$ md5sum abc.apk
153cf9b11ee14f1afb7c6e9a211d4b63 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200