Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
66
android Malware and analysis
generated through such an analysis over his lunch hour. Upon return-
ing from lunch, he nds that the primary package name of interest in
the APK is com.sileria.alsalah. Permissions are extensive as seen in
former open source intelligence for the sample of interest. e analyst
is wondering if this is a poorly coded app that requires a lot more
permissions than what a simple prayer reminder app should require or
if it is a Trojaned app. He discovers that there is a service associated
with the app, com.awake.alArabiyyah, and that it looks like it may
hook boot to run upon startup of the device. Some sandbox results
suggest it may have a SQLite database component and may download
les to the SD card. e analyst is ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200