Normal view MARC view ISBD view

Android Malware and Analysis.

By: Dunham, Ken.
Contributor(s): Hartman, Shane | Quintans, Manu | Morales, Jose Andre | Strazzere, Tim.
Material type: TextTextSeries: eBooks on Demand.Publisher: Philadelphia, PA : CRC Press, 2014Description: 1 online resource (232 p.).ISBN: 9781482252200.Subject(s): Android (Electronic resource) | Malware (Computer software) | Mobile computing -- Security measures | Operating systems (Computers) | Smartphones -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Android Malware and AnalysisDDC classification: 005.432 Online resources: Click here to view this ebook.
Contents:
Front Cover -- Contents -- Preface -- Acknowledgments -- Authors -- Conventions -- Chapter 1: Introduction to the Android Operating System and Threats -- Chapter 2: Malware Threats, Hoaxes, and Taxonomy -- Chapter 3: Open Source Tools -- Chapter 4: Static Analysis -- Chapter 5: Android Malware Evolution -- Chapter 6: Android Malware Trends and Reversing Tactics -- Chapter 7: Behavioral Analysis -- Chapter 8: Building Your Own Sandbox -- Chapter 9: Case Study Examples -- Bibliography -- Back Cover
Summary: Introduction to the Android Operating System and Threats Android Development Tools Risky Apps Looking Closer at Android Apps Malware Threats, Hoaxes, and Taxonomy 2010      FakePlayer      DroidSMS      FakeInst      TapSnake     SMSReplicator      Geinimi 2011      ADRD      Pjapps      BgServ      DroidDream      Walkinwat      zHash      DroidDreamLight     Zsone      BaseBridge      DroidKungFu     GGTracker      jSMSHider      Plankton      GoldD
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Front Cover -- Contents -- Preface -- Acknowledgments -- Authors -- Conventions -- Chapter 1: Introduction to the Android Operating System and Threats -- Chapter 2: Malware Threats, Hoaxes, and Taxonomy -- Chapter 3: Open Source Tools -- Chapter 4: Static Analysis -- Chapter 5: Android Malware Evolution -- Chapter 6: Android Malware Trends and Reversing Tactics -- Chapter 7: Behavioral Analysis -- Chapter 8: Building Your Own Sandbox -- Chapter 9: Case Study Examples -- Bibliography -- Back Cover

Introduction to the Android Operating System and Threats Android Development Tools Risky Apps Looking Closer at Android Apps Malware Threats, Hoaxes, and Taxonomy 2010      FakePlayer      DroidSMS      FakeInst      TapSnake     SMSReplicator      Geinimi 2011      ADRD      Pjapps      BgServ      DroidDream      Walkinwat      zHash      DroidDreamLight     Zsone      BaseBridge      DroidKungFu     GGTracker      jSMSHider      Plankton      GoldD

Description based upon print version of record.

Author notes provided by Syndetics

<p>Ken Dunham has nearly two decades of experience on the front lines of information security. He currently works as a principal incident intelligence engineer for iSIGHT Partners and as CEO of the nonprofit Rampart Research. Dunham regularly briefs top-level executives and officials in Fortune 500 companies and manages major newsworthy incidents globally. Formerly, he led training efforts as a contractor for the U.S. Air Force for U-2 reconnaissance, Warthog Fighter, and Predator (UAV) programs. Concurrently, he also authored top Web sites and freeware antiviruses and other software, and has taught at multiple levels on a diverse range of topics.<br> <br> Dunham is the author of multiple books, is a regular columnist, and has authored thousands of incident and threat reports over the past two decades. He holds a master's of teacher education and several certifications: CISSP, GCFA Gold (forensics), GCIH Gold (Honors) (incident handling), GSEC (network security), GREM Gold (reverse engineering), and GCIA (intrusion detection). He is also the founder and former president of Idaho InfraGard and Boise ISSA, a member of multiple security organizations globally, and former Wildlist Organization reporter. In 2014, Dunham was awarded the esteemed ISSA International Distinguished Fellow status. Dunham is also the founder of the nonprofit organization Rampart Research, which meets the needs of over 1,000 cybersecurity experts globally.<br> <br> Shane Hartman , CISSP, GREM, is a malware engineer at iSIGHT Partners, focusing on the analysis and characteristics of malicious code. He has been in the information technology field for 20 years covering a wide variety of areas including network engineering and security. He is also a frequent speaker at local security events and teaches security courses at the University of South Florida. Hartman holds a master's degree in digital forensics from the University of Central Florida.<br> <br> Jose Morales </p>

There are no comments for this item.

Log in to your account to post a comment.