Chapter 6

Reverse Engineering Android Applications

In this chapter, we will cover malware basics—how to identify malware, malware behavior, and malware features. We will then discuss a custom Android BOT application created by the authors and demonstrate to the reader how potential malware can bypass Android built-in checks.

The Android BOT walkthrough will include stealing a user’s browser history and Short Message Service (SMS) as well as call logs, and it attempts to drain the phone’s battery. We will also present a sample application to show the readers how to reverse engineer or analyze malicious applications. After completing this chapter, the reader will be able to write Android BOT in Java. The reader will also become familiar with ...

Get Android Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.