Chapter 10. Solutions in this chapter:

Introduction

When a mobile malware researcher is provided or finds a piece of potential malware, they must analyze the code to determine what, if any, malicious content it contains. This process, more commonly referred to as mobile malware reverse-engineering, is time-consuming and tedious—yet it must be done. While the general functionality of a piece of code can be quickly determined by monitoring system changes, the sheer chance that a code might be hiding some more discreet purpose that is not readily apparent means the sample must be completely analyzed ...

Get Mobile Malware Attacks and Defense now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.