Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
106
android Malware and analysis
settings and tools will be there. Additionally, the time to boot and
interact with the emulator is substantially quicker.
e next way to preserve the settings is to run the emulator within
a virtual machine, such as VMWare or Virtual Box. Next congure
the emulator to support your analysis and then save a snapshot with
the virtual machine software. is will ensure that each time you
revert to the snapshot the emulator is reverted as well.
An alternative way to support preservation is to overwrite your
default image le with your updated image. As shown earlier the
emulator uses the le userdata.img to create the default environment
you see when starting up for the rst time. Once running, the system
creates another ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200