




Full description not available





C**N
All OK.
All OK.
E**E
Great book on Android malware reverse engineering and detection!
This book offers a holistic approach for learning how to deal with malware targeting Android platform. I find this book to be equally interesting to read for both people with little experience in the domain of malware analysis as quick-start guide as well as for experienced reverse engineers who would want to translate their knowledge from malware analysis in other platforms to Android. This book is definitely worth the time reading it.The first half of the book is a great source of information on reverse engineering Android malware. Chapters on categories of Android Malware and examples of the malware in the wild set up the necessary context for the readers and help to better understand why Android malware focuses on certain infection/monetization techniques. It also bring context in the evolution of mitigation and hardening in Android platform.Chapters on static and dynamic analysis are very practical and engaging to read which I probably enjoyed the most in the book. They teach readers how to do reverse engineering of Android malware -- covers tooling, methodologies, hints to look for in the code or binary artifacts when doing reverse engineering.The second half of the book is dedicated to using machine learning techniques for detecting malware. It starts with a concise yet self-contained necessary theoretical background. In my point of view the authors hit a very good balance for making material accurate and comprehensive yet easy to read and follow along for people without extensive background in the field (which is not a trivial thing for math texts). As it is probably impossible to fit all the necessary theoretical material in a single (or even couple of chapters) they text offers references to sources which cover certain topics in-depth -- for those readers who would like to dive deeper in machine learning. Finally, the book wraps with application of the discussed machine learning techniques to certain malware families.
Trustpilot
3 days ago
1 week ago