Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
91
7
BehAvIorAl AnAlySIS
Dynamic analysis of Android samples is very similar to analysis of
any other binary les be it Linux les or Windows executables. is
chapter introduces customized Android analysis setup and congura-
tion for analyzing Android threats.
Introduction to AVD and Eclipse
To begin working with malicious Android applications, you will have
to set up your environment to not only support emulated devices but
physical ones as well. You might ask, “Why do I need a physical device
if the emulator works ne for application developers?” Although it is
true the emulator can perform nearly all the operations on a real device,
there are some limitations to just using an emulated device. More on
dierences between physical devices and emul ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200