Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
121
Behavioral analysis
Next we can turn our attention to LogCat. ere is a lot of
data to contend with so creating a lter will be the key to
scaling down the data. We click the green plus sign on the
left side and give it a name, then lter by application name; in
this case, that is com.scott.herbert.AnDOSid. Once applied
the results are ltered for review.
Image 7.22 LogCat ltered results.
Additionally, on the left-hand side of the screen you will see
the ability to export this log for later review. However, the
export function works on the selection only, so make sure you
select all the entries before saving.
Last, we turn the pack ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200