skip to main content
Skip header Section
Android Hacker's HandbookMarch 2014
Publisher:
  • Wiley Publishing
ISBN:978-1-118-60864-7
Published:31 March 2014
Pages:
576
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Cited By

  1. Adebayo O, Abdul Aziz N and Gimenez-Guzman J (2019). Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  2. Jiang H, Yang K, Wang L, Gao J and Hu S A Code Protection Scheme via Inline Hooking for Android Applications Cyberspace Safety and Security, (102-116)
  3. Mazuera-Rozo A, Bautista-Mora J, Linares-Vásquez M, Rueda S and Bavota G (2019). The Android OS stack and its vulnerabilities, Empirical Software Engineering, 24:4, (2056-2101), Online publication date: 1-Aug-2019.
  4. ACM
    Rana M, Gudla C and Sung A Evaluating Machine Learning Models for Android Malware Detection Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (17-21)
  5. Nguyen-Vu L, Chau N, Kang S, Jung S and Zhang Z (2017). Android Rooting, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  6. Jo H, Choi W, Na S, Woo S and Lee D (2017). Vulnerabilities of Android OS-Based Telematics System, Wireless Personal Communications: An International Journal, 92:4, (1511-1530), Online publication date: 1-Feb-2017.
  7. Linares-Vásquez M, Bavota G and Escobar-Velásquez C An empirical study on Android-related vulnerabilities Proceedings of the 14th International Conference on Mining Software Repositories, (2-13)
  8. ACM
    Schoiber G, Mayrhofer R and Hölzl M DAMN Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, (40-44)
  9. ACM
    Offiah M, Gross T and Borschbach M Evaluating BSS algorithms in a mobile context realized by a client-server architecture Proceedings of the International Conference on Mobile Software Engineering and Systems, (199-209)
  10. ACM
    Zhang H, She D and Qian Z Android Root and its Providers Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1093-1104)
  11. ACM
    Sierra F and Ramirez A Defending Your Android App Proceedings of the 4th Annual ACM Conference on Research in Information Technology, (29-34)
Contributors
  • Northeastern University
  • RWTH Aachen University

Recommendations