Android Hacker's Handbook

Android Hacker's Handbook

Joshua J. Drake / Pau Oliva Fora / Zach Lanier / Collin Mulliner / Stephen A. Ridley / Georg Wichers
星期六, 三月 1, 2014


The first comprehensive guide to discovering and preventingattacks on the Android OS
As the Android operating system continues to increase its shareof the smartphone market, smartphone hacking remains a growingthreat. Written by experts who rank among the world's foremostAndroid security researchers, this book presents vulnerabilitydiscovery, analysis, and exploitation tools for the good guys.Following a detailed explanation of how the Android OS works andits overall security architecture, the authors examine howvulnerabilities can be discovered and exploits developed forvarious system components, preparing you to defend againstthem.
If you are a mobile device administrator, security researcher,Android app developer, or consultant responsible for evaluatingAndroid security, you will find this guide is essential to yourtoolbox.
A crack team of leading Android security researchers explainAndroid security risks, security design and architecture, rooting,fuzz testing, and vulnerability analysis
Covers Android application building blocks and security as wellas debugging and auditing Android apps
Prepares mobile device administrators, security researchers,Android app developers, and security consultants to defend Androidsystems against attack
Android Hacker's Handbook is the first comprehensiveresource for IT professionals charged with smartphonesecurity.


Chapter 1 Looking at the Ecosystem
Chapter 2 Android Security Design and Architecture
Chapter 3 Rooting Your Device
Chapter 4 Reviewing Application Security
Chapter 5 Understanding Android’s Attack Surface
Chapter 6 Finding Vulnerabilities with Fuzz Testing
Chapter 7 Debugging and Analyzing Vulnerabilities
Chapter 8 Exploiting User Space Software
Chapter 9 Return Oriented Programming
Chapter 10 Hacking and Attacking the Kernel
Chapter 11 Attacking the Radio Interface Layer
Chapter 12 Exploit Mitigations
Chapter 13 Hardware Attacks
Appendix A Tool Catalog
Appendix B Open Source Repositories
Appendix C References