O'Reilly logo

Hacking Exposed Mobile by Mike Price, John Steven, Scott Matsumoto, Swapnil Deshmukh, Sarath Geethakumar, Joel Scambray, Jason Rouse, Mike Stanfield, Neil Bergman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

0-day vulnerability, 71

2012 Mobile Threat and Security Roundup, 140

A

A5/1 authentication, 29

Absinthe app, 53, 59

access

Internet, 5

offline, 217

physical, 9–10, 76–77, 78

Access Control Enforcer, 242

Access Granted Channel (AGCH), 29

access groups, 224–225

access tokens, 158, 160, 162

ADB (Android Debug Bridge), 88–89, 91, 248

ADB debugging, 244, 248

adbd (Android Debug Bridge Daemon), 122

addJavascriptInterface function, 177–180

Address Space Layout Randomization (ASLR), 51, 52, 85, 230, 231

ADSafe, 223

Advanced RISC ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required