O'Reilly logo

Android Security by Abhishek Dubey, Anmol Misra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Reverse Engineering Android Applications

In this chapter, we will cover malware basics—how to identify malware, malware behavior, and malware features. We will then discuss a custom Android BOT application created by the authors and demonstrate to the reader how potential malware can bypass Android built-in checks.

The Android BOT walkthrough will include stealing a user’s browser history and Short Message Service (SMS) as well as call logs, and it attempts to drain the phone’s battery. We will also present a sample application to show the readers how to reverse engineer or analyze malicious applications. After completing this chapter, the reader will be able to write Android BOT in Java. The reader will also become familiar with reverse ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required