The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.
- A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis
- Covers Android application building blocks and security as well as debugging and auditing Android apps
- Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack
Keywords: Networking / Security, Android security, Android phone security, Android hacking, hacking Android phones, Android OS security, Android phone hacks, Android OS, Android security risks, Android vulnerabilities, securing Android phones, Android attacks, mobile device security, hacker's handbook, book on hacking, hacking manual, security from hacking, smartphone security, Android Hacker's Handbook, Joshua Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski, Security Design and Architecture, Rooting, Application Security, Android Application Building Blocks, Auditing Android Applications, Attack Surface in Detail, Fuzz Testing, Debugging and Vulnerability Analysis, User Mode Exploitation, Return-Oriented Programming, Attacking Kernel Mode, Building Your Own Kernel, Radio Interface Layer, Baseband Attacks
- Drake, Joshua J.
- Lanier, Zach
- Mulliner, Collin
- Oliva, Pau
- Ridley, Stephen A.
- Wicherski, Georg
- John Wiley and Sons, Inc.
- Publication year
- Page amount
- 576 pages
- Information Technology, Telecommunications
- eISBN (ePUB)
- Printed ISBN