Normal view MARC view ISBD view

Android Malware.

By: Jiang, Xuxian.
Contributor(s): Zhou, Yajin.
Material type: TextTextSeries: eBooks on Demand.Springerbriefs in Computer Science: Publisher: Dordrecht : Springer, 2013Description: 1 online resource (50 p.).ISBN: 9781461473947.Subject(s): Computer security | Data protection | Malware (Computer software)Genre/Form: Electronic books.Additional physical formats: Print version:: Android MalwareDDC classification: 005.8 | 005.84 LOC classification: QA76.76.C68Online resources: Click here to view this ebook.
Contents:
Acknowledgments; Contents; Acronyms; 1 Introduction; 2 A Survey of Android Malware; 2.1 Malware Dataset; 2.2 Malware Characterization; 2.2.1 Malware Installation; 2.2.2 Activation; 2.2.3 Malicious Payloads; 2.2.4 Permission Usage; 3 Case Studies; 3.1 Malware I: Plankton; 3.1.1 Phoning Home; 3.1.2 Dynamic Execution; 3.2 Malware II: DroidKungFu; 3.2.1 Root Exploits; 3.2.2 Command and Control (C&C) Servers; 3.2.3 Payloads; 3.2.4 Obfuscation, JNI, and Others; 3.3 Malware III: AnserverBot; 3.3.1 Anti-Analysis; 3.3.2 Command and Control (C&C) Servers; 4 Discussion; 5 Additional Reading; 5.1 Books
5.1.1 Malware Detection and Defense5.1.2 Smartphone (Apps) Security; 5.2 Conference and Workshop Proceedings; 6 Summary; References; Index
Summary: Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform.  Covering key topics like the Android malware history, malware behavior
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.76.C68 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1317427 Available EBL1317427

Acknowledgments; Contents; Acronyms; 1 Introduction; 2 A Survey of Android Malware; 2.1 Malware Dataset; 2.2 Malware Characterization; 2.2.1 Malware Installation; 2.2.2 Activation; 2.2.3 Malicious Payloads; 2.2.4 Permission Usage; 3 Case Studies; 3.1 Malware I: Plankton; 3.1.1 Phoning Home; 3.1.2 Dynamic Execution; 3.2 Malware II: DroidKungFu; 3.2.1 Root Exploits; 3.2.2 Command and Control (C&C) Servers; 3.2.3 Payloads; 3.2.4 Obfuscation, JNI, and Others; 3.3 Malware III: AnserverBot; 3.3.1 Anti-Analysis; 3.3.2 Command and Control (C&C) Servers; 4 Discussion; 5 Additional Reading; 5.1 Books

5.1.1 Malware Detection and Defense5.1.2 Smartphone (Apps) Security; 5.2 Conference and Workshop Proceedings; 6 Summary; References; Index

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform.  Covering key topics like the Android malware history, malware behavior

Description based upon print version of record.

There are no comments for this item.

Log in to your account to post a comment.