The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used.The book presents the insights of experts in the field, who have already sized up the best tools, tactics, and procedures for recognizing and analyzing Android malware threats quickly and effectively. You also get access to an online library of tools that supplies what you will need to begin your own analysis of Android malware threats. Tools available on the books site include updated information, tutorials, code, scripts, and author assistance.This is not a book on Android OS, fuzz testing, or social engineering. Instead, it is about the best ways to analyze and tear apart Android malware threats. After reading the book, you will be able to immediately implement the tools and tactics covered to identify and analyze the latest evolution of Android threats.
Cited By
- Xie N, Wang X, Wang W and Liu J (2019). Fingerprinting Android malware families, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:3, (637-646), Online publication date: 1-Jun-2019.
- Rahman A, Pradhan P, Partho A and Williams L Predicting Android application security and privacy risk with static code metrics Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, (149-153)
- Wang X, Zhu S, Zhou D and Yang Y Droid-AntiRM Proceedings of the 33rd Annual Computer Security Applications Conference, (350-361)
- Rasthofer S, Asrar I, Huber S and Bodden E How Current Android Malware Seeks to Evade Automated Code Analysis Information Security Theory and Practice, (187-202)
Recommendations
Hartley's test ranked opcodes for Android malware analysis
SIN '15: Proceedings of the 8th International Conference on Security of Information and NetworksThe popularity and openness of Android platform encourage malware authors to penetrate various market places with malicious applications. As a result, malware detection has become a critical topic in security. Currently signature-based system is able to ...
Android Malware Detection via a Latent Network Behavior Analysis
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsThe rapid growth of smartphones has lead to a renaissance for mobile application services. Android and iOS now as the most popular smartphone platforms offer a public marketplace respectively, the Android Market and App Store- but operate with ...
Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecuritySince Android is the most widespread operating system, malware targeting it poses a severe threat to the security and privacy of millions of users and is increasing from year to year. The response from the community was swift, and many researchers have ...