Chapter 10. Solutions in this chapter:


When a mobile malware researcher is provided or finds a piece of potential malware, they must analyze the code to determine what, if any, malicious content it contains. This process, more commonly referred to as mobile malware reverse-engineering, is time-consuming and tedious—yet it must be done. While the general functionality of a piece of code can be quickly determined by monitoring system changes, the sheer chance that a code might be hiding some more discreet purpose that is not readily apparent means the sample must be completely analyzed ...

Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.