Book description
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.
- A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis
- Covers Android application building blocks and security as well as debugging and auditing Android apps
- Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack
Table of contents
- Cover
- Chapter 1: Looking at the Ecosystem
- Chapter 2: Android Security Design and Architecture
- Chapter 3: Rooting Your Device
- Chapter 4: Reviewing Application Security
- Chapter 5: Understanding Android's Attack Surface
- Chapter 6: Finding Vulnerabilities with Fuzz Testing
- Chapter 7: Debugging and Analyzing Vulnerabilities
- Chapter 8: Exploiting User Space Software
- Chapter 9: Return Oriented Programming
- Chapter 10: Hacking and Attacking the Kernel
- Chapter 11: Attacking the Radio Interface Layer
-
Chapter 12: Exploit Mitigations
- Classifying Mitigations
- Code Signing
- Hardening the Heap
- Protecting Against Integer Overflows
- Preventing Data Execution
- Address Space Layout Randomization
- Protecting the Stack
- Format String Protections
- Read-Only Relocations
- Sandboxing
- Fortifying Source Code
- Access Control Mechanisms
- Protecting the Kernel
- Other Hardening Measures
- Summary of Exploit Mitigations
- Disabling Mitigation Features
- Overcoming Exploit Mitigations
- Looking to the Future
- Summary
- Chapter 13: Hardware Attacks
- Appendix A: Tool Catalog
- Appendix B: Open Source Repositories
- Appendix C: References
- Introduction
- End User License Agreement
Product information
- Title: Android Hacker's Handbook
- Author(s):
- Release date: March 2014
- Publisher(s): Wiley
- ISBN: 9781118608647
You might also like
book
iOS Hacker's Handbook
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's …
book
Hacking Android
Explore every nook and cranny of the Android OS to modify your device and guard it …
book
Android Security Internals
Android Security Internals delves into Android components and subsystems to give you a deep and complete …
book
Hacking Exposed Mobile
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new …