Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

October 24, 2014 by Auerbach Publications
Reference - 242 Pages - 83 B/W Illustrations
ISBN 9781482252194 - CAT# K23862

was $62.95

USD$50.36

SAVE ~$12.59

Add to Wish List
FREE Standard Shipping!

Features

  • Covers both methods of malware analysis: dynamic and static
  • Explains how to use to use dynamic malware analysis to check the behavior of an application/malware as it’s been executed in the system
  • Describes how to use static analysis to break apart the application/malware using reverse engineering tools and techniques to re-create the actual code and algorithms used
  • Highlights the best tools and tactics available for analyzing Android malware
  • Includes access to an online library of tools to provide readers what they need to analyze malware threats right away
  • Updated information, tutorials, a private forum, code, scripts, tools, and author assistance are available at AndroidRisk.com for first-time owners of the book.

Summary

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.

In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.

This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used.

The book presents the insights of experts in the field, who have already sized up the best tools, tactics, and procedures for recognizing and analyzing Android malware threats quickly and effectively. You also get access to an online library of tools that supplies what you will need to begin your own analysis of Android malware threats. Tools available on the book’s site include updated information, tutorials, code, scripts, and author assistance.

This is not a book on Android OS, fuzz testing, or social engineering. Instead, it is about the best ways to analyze and tear apart Android malware threats. After reading the book, you will be able to immediately implement the tools and tactics covered to identify and analyze the latest evolution of Android threats.

Updated information, tutorials, a private forum, code, scripts, tools, and author assistance are available at AndroidRisk.com for first-time owners of the book.