Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics

Android malware and analysis / Ken Dunham, Shane Hartman, Jose Andre Morales, Manu Quintans, Tim Strazzere

By: Contributor(s): Material type: Computer fileComputer fileLanguage: English Publication details: Boca Raton : Taylor & Francis, [2015];©2015Description: 1 online resourceISBN:
  • 9781482252200
Subject(s): DDC classification:
  • 005.840 D917
Online resources:
Contents:
chapter 1. Introduction to the Android operating system and threats -- chapter 2. Malware threats, hoaxes, and taxonomy -- chapter 3. Open source tools -- chapter 4. Static analysis -- chapter 5. Android malware evolution -- chapter 6. Android malware trends and reversing tactics -- chapter 7. Behavioral analysis -- chapter 8. Building your own sandbox -- chapter 9. Case study examples
Summary: There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for analyzing Android malware. Many tools exist in the open source market today but do not work as advertised and frequently include failed installations and extensive dependencies for proper installation. The book includes online access to a library of tools that provide readers with what they need to begin the analysis of malware threats right away
List(s) this item appears in: Computer Science
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

An Auerbach book

chapter 1. Introduction to the Android operating system and threats -- chapter 2. Malware threats, hoaxes, and taxonomy -- chapter 3. Open source tools -- chapter 4. Static analysis -- chapter 5. Android malware evolution -- chapter 6. Android malware trends and reversing tactics -- chapter 7. Behavioral analysis -- chapter 8. Building your own sandbox -- chapter 9. Case study examples

There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for analyzing Android malware. Many tools exist in the open source market today but do not work as advertised and frequently include failed installations and extensive dependencies for proper installation. The book includes online access to a library of tools that provide readers with what they need to begin the analysis of malware threats right away

There are no comments on this title.

to post a comment.
Share
This system is made operational by the in-house staff of the CUP Library.