Chapter 10. Solutions in this chapter:
- Examining the General Analysis Process
- Detailing the Analysis of FlexiSPY
- Debugging InfoJack
- Solutions Fast Track
- Frequently Asked Questions
When a mobile malware researcher is provided or finds a piece of potential malware, they must analyze the code to determine what, if any, malicious content it contains. This process, more commonly referred to as mobile malware reverse-engineering, is time-consuming and tedious—yet it must be done. While the general functionality of a piece of code can be quickly determined by monitoring system changes, the sheer chance that a code might be hiding some more discreet purpose that is not readily apparent means the sample must be completely analyzed ...