Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
101
Behavioral analysis
Setting Up an Emulator for Testing
Once you have your AVDs congured you can start them. A running
emulator behaves just like any other application on your system and
can be closed or minimized.
Image 7.6 Example emulated Android device.
e emulator is very versatile for networking, allowing you to set
up several dierent networking congurations. Following is some
background on these capabilities. e emulator runs a NAT’d address
scheme in the 10.0.2.x network isolating it from your host machine.
It only sees that it can connect through the Ethernet interface to the
Internet. Next is an example of a basic emulator setup ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200