April 2018
Intermediate to advanced
640 pages
17h 12m
English
Smartphone devices replace the traditional “mobile phones” as a pocket-sized personal computer and multimedia device, all in one. These personal devices provide a window into the owner’s life. A calendar containing the user’s daily schedule, a phone book with a list of contacts, social media accounts, and banking applications are only a small subset of all the information that can be found on a typical smartphone. Malware authors have already tapped into this rich platform and are exploiting it in various ways. Understanding the architecture of mobile devices and application analysis techniques empowers users to determine whether applications accessing their personal data are doing it in a nonmalicious way. ...