Muutke küpsiste eelistusi

Android Malware 2013 ed. [Pehme köide]

  • Formaat: Paperback / softback, 44 pages, kõrgus x laius: 235x155 mm, kaal: 1007 g, 9 Illustrations, black and white, 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 13-Jun-2013
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461473934
  • ISBN-13: 9781461473930
  • Pehme köide
  • Hind: 48,87 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,49 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 44 pages, kõrgus x laius: 235x155 mm, kaal: 1007 g, 9 Illustrations, black and white, 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 13-Jun-2013
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461473934
  • ISBN-13: 9781461473930

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.

Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

1 Introduction
1(2)
2 A Survey of Android Malware
3(18)
2.1 Malware Dataset
3(2)
2.2 Malware Characterization
5(16)
2.2.1 Malware Installation
5(7)
2.2.2 Activation
12(1)
2.2.3 Malicious Payloads
13(5)
2.2.4 Permission Usage
18(3)
3 Case Studies
21(10)
3.1 Malware I: Plankton
21(2)
3.1.1 Phoning Home
21(1)
3.1.2 Dynamic Execution
22(1)
3.2 Malware II: DroidKungFu
23(3)
3.2.1 Root Exploits
24(1)
3.2.2 Command and Control (C&C) Servers
24(2)
3.2.3 Payloads
26(1)
3.2.4 Obfuscation, JNI, and Others
26(1)
3.3 Malware III: AnserverBot
26(5)
3.3.1 Anti-Analysis
27(1)
3.3.2 Command and Control (C&C) Servers
28(3)
4 Discussion
31(2)
5 Additional Reading
33(4)
5.1 Books
33(1)
5.1.1 Malware Detection and Defense
33(1)
5.1.2 Smartphone (Apps) Security
34(1)
5.2 Conference and Workshop Proceedings
34(3)
6 Summary
37(2)
References 39(4)
Index 43