Android Hacker's Handbook

Couverture

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.

If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.

  • A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis
  • Covers Android application building blocks and security as well as debugging and auditing Android apps
  • Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack
Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

 

Table des matières

Looking at the Ecosystem
1
Looking at the Ecosystem
7
Android Security Design and Architecture
25
Rooting Your Device
57
Reviewing Application Security
83
Understanding Androids Attack Surface
129
Finding Vulnerabilities with Fuzz Testing
177
Debugging and Analyzing Vulnerabilities
205
Hacking and Attacking the Kernel
309
Attacking the Radio Interface Layer
367
Exploit Mitigations
391
Hardware Attacks
423
Stealing Secrets and Firmware
469
Appendix A Tool Catalog
485
Appendix B Open Source Repositories
501
References
511

Exploiting User Space Software
263
Return Oriented Programming
291

Autres éditions - Tout afficher

Expressions et termes fréquents

À propos de l'auteur (2014)

JOSHUA J. DRAKE is a Director of Research Science at Accuvant LABS.

PAU OLIVA FORA is a Mobile Security Engineer with viaForensics.

ZACH LANIER is a Senior Security Researcher at Duo Security.

COLLIN MULLINER is a postdoctoral researcher at Northeastern University.

STEPHEN A. RIDLEY is a Principal Researcher with Xipiter.

GEORG WICHERSKI is a Senior Security Researcher with CrowdStrike.

Informations bibliographiques