ABSTRACT

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, K

chapter 2|28 pages

Malware Threats, Hoaxes, and Taxonomy

chapter 3|16 pages

Open Source Tools

chapter 4|20 pages

Static Analysis

chapter 5|6 pages

Android Malware Evolution

chapter 7|38 pages

Behavioral Analysis

chapter 8|46 pages

Building Your Own Sandbox

chapter 9|30 pages

Case Study Examples