Jump to content
Usr6

[Books] Android -Reverse engineering

Recommended Posts

07_Reversing Android Malware.pdf

³ 1314775653_emilien.girault-at-sogeti.com_Forensic Challenge 2011 - Challenge 9 - v2.doc

³ 1_La_diffusione_di_Android_al_di_fuori_del_marcato_mobile.pdf

³ A Look Inside the Android Kernel.pdf

³ A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android.pdf

³ A RECORD-BREAKING YEAR FOR MALWARE.pdf

³ A Study of Android Application Security.pdf

³ A Survey of Mobile Malware in the Wild.pdf

³ AISEC-TR-2012-001-Android-OS-Security.pdf

³ An Android Security Case Study with Bauhaus.pdf

³ Andbot Towards Advanced Mobile Botnets .pdf

³ Android Analysis Framework Dexter.pdf

³ Android Binder.pdf

³ Android Malware Forensics Reconstruction of Malicious Events.pdf

³ Android Reverse Engineering Tools.pdf

³ Android security model.pdf

³ Android Security.pdf

³ Android-Market-Threat-Analysis-6-22-10-v1.pdf

³ androidcours.pdf

³ Android_Security_Model.pdf

³ android_trojan_zitmo_final_pdf_17585.pdf

³ androsim-1.2.exe

³ AnserverBot_Analysis.pdf

³ Anti-Malware solutions for Android.pdf

³ Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern smartphone Systems.pdf

³ Arthur_Donkers_en_Ralph_Moonen.pdf

³ Behavior abstraction in Malware analysis.pdf

³ BH_US_11_Daswani_Mobile_Malware_WP.pdf

³ BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf

³ Bypassing the Android Permission Model.ppt

³ CNCCS-Smartphone-Malware-Full-Report-Translated-06-7-11-FINAL.pdf

³ codegate2k10tora-100426060011-phpapp01.pdf

³ codeobfuscation-110909001233-phpapp01.pptx

³ COMPLETE-DroidDream-Technical-Tear-Down_Lookout-Mobile-Security.pdf

³ Cryptography for mobile malware obfuscation.pdf

³ Dan_Guido_Mike_Arpaia_Mobile_Exploit_Intelligence_Project.pdf

³ demystifying-android.pdf

³ Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets.pdf

³ Detecting Android Malware on Network Level.pdf

³ Detection of Malicious Applications on Android OS.pdf

³ Detection of Smartphone Malware.pdf

³ dissecting-andro-malware_33754.pdf

³ Documentation reverse-engineering avanc‚ DALVIK.pdf

³ Fuzzing the Phone in your Phone.pdf

³ Geinimi_Trojan_Teardown.pdf

³ GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf

³ HackingyourDroid-Slides.pdf

³ History-of-Mobile-Malware.pdf

³ HPW2011 - Reversing Android Malware - Mahmud Ab Rahman.pdf

³ INSECURE-Mag-34.pdf

³ InsomniDroid CrackMe Spoiler Insomni'hack 2012.pdf

³ isec_android_exploratory_blackhat_2009.pdf

³ jnpr-2011-mobile-threats-report.pdf

³ linux_versus_android.pdf

³ lookout-mobile-threat-report-2011.pdf

³ Malicious Mobile Threats Report 2010-2011.pdf

³ Malware in iOS and Android... The gathering storm.pdf

³ Meyers - Reserve Engineers Mobile Apps.pdf

³ Mila Parkour-MOBILEMALWARE-20120619-3041.zip

³ Mobile Malware Analysis - Process Monitor Tool.pdf

³ Mobile Malware Evolution and the Android Security Model.pdf

³ MobileThreatReport_Q1_2012.pdf

³ Mobile_Threat_Report_Q4_2011.pdf

³ motivations_of_recent_android_malware.pdf

³ MyCERT-3-PST-HoneynetConf-Reversing Android Malware.pdf

³ NDSS_2012_Towards_Taming_Privilege-Escalation_Attacks_on_Android.pdf

³ Practice of Android Reverse Engineering.pdf

³ Presentation_DyAnA_SigInt2012_2012-05-20.pdf

³ Privilege Escalation Attacks on Android.pdf

³ Reducing the Window of Opportunity for Android Malware Gotta catch 'em all.pdf

³ Reverse Engineering of the Android File System.pdf

³ Reversing Android Apps.pdf

³ Reversing Android.pdf

³ ReversingAndroid.pdf

³ RFJ2009-NordSec.pdf

³ Rise of the iBots 0wning a telco network.pdf

³ Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.pdf

³ rp-quarterly-threat-q1-2011.pdf

³ rpt_security_in_the_age_of_mobility.pdf

³ slides_Android_L3info.pdf

³ Smartphone Malware Evolution Revisited Android Next Target.pdf

³ SOCIAL NETWORKING FOR BOTNET.pdf

³ spsm11-burguera.pdf

³ sp_android-malware-sms-relay-tip-of-iceberg.pdf

³ SSTIC2011-Slides-Securite_Android-ruff.pdf

³ SteveFox_MobileBotnetTrends2011_v2 (1).pdf

³ summercon10-androidhax-jonoberheide.pdf

³ S‚curit‚ du SystŠme Android.pdf

³ taming_the_robot_droidcon11_talk.pdf

³ The Case for SE Android.pdf

³ The_Dalvik_Virtual_Machine.pdf

³ Understanding Android Security

³ Understanding Android Security.pdf

³ understandingandroidsecuritymodel-110304193331-phpapp01.pptx

³ when-android-apps-want-more-than-they-need.pdf

³ wp-android-malware-past-present-future.pdf

³ Yxes-Apvrille-EICAR2010.pdf

³ "Andromaly" a behavioral malware detection.pdf

³

ÀÄÄÄPrimer On AndroidOS Reversing

³ ARTeam.esfv

³ Read Me First.txt

³ Torrent downloaded from Demonoid.me.txt

³

ÃÄÄÄtools

³ ÃÄÄÄDecompiler

³ ³ baksmali.jar

³ ³ smali.jar

³ ³

³ ÀÄÄÄSigning APKs

³ autosign.bat

³ setx.exe

³ testsign.jar

³ testsign_apk.reg

³

ÀÄÄÄTutorial

FullTuT.htm

FullTuT.swf

FullTuT.txt

Download: https://www.dropbox.com/sh/e2qo3ik9ubdz7h2/muZT8lC7gs

Sursa:
http://twitter.com/i7s3curi7y

Edited by Usr6
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...