Usr6 Posted October 8, 2012 Report Posted October 8, 2012 (edited) 07_Reversing Android Malware.pdf³ 1314775653_emilien.girault-at-sogeti.com_Forensic Challenge 2011 - Challenge 9 - v2.doc³ 1_La_diffusione_di_Android_al_di_fuori_del_marcato_mobile.pdf³ A Look Inside the Android Kernel.pdf³ A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android.pdf³ A RECORD-BREAKING YEAR FOR MALWARE.pdf³ A Study of Android Application Security.pdf³ A Survey of Mobile Malware in the Wild.pdf³ AISEC-TR-2012-001-Android-OS-Security.pdf³ An Android Security Case Study with Bauhaus.pdf³ Andbot Towards Advanced Mobile Botnets .pdf³ Android Analysis Framework Dexter.pdf³ Android Binder.pdf³ Android Malware Forensics Reconstruction of Malicious Events.pdf³ Android Reverse Engineering Tools.pdf³ Android security model.pdf³ Android Security.pdf³ Android-Market-Threat-Analysis-6-22-10-v1.pdf³ androidcours.pdf³ Android_Security_Model.pdf³ android_trojan_zitmo_final_pdf_17585.pdf³ androsim-1.2.exe³ AnserverBot_Analysis.pdf³ Anti-Malware solutions for Android.pdf³ Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern smartphone Systems.pdf³ Arthur_Donkers_en_Ralph_Moonen.pdf³ Behavior abstraction in Malware analysis.pdf³ BH_US_11_Daswani_Mobile_Malware_WP.pdf³ BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf³ Bypassing the Android Permission Model.ppt³ CNCCS-Smartphone-Malware-Full-Report-Translated-06-7-11-FINAL.pdf³ codegate2k10tora-100426060011-phpapp01.pdf³ codeobfuscation-110909001233-phpapp01.pptx³ COMPLETE-DroidDream-Technical-Tear-Down_Lookout-Mobile-Security.pdf³ Cryptography for mobile malware obfuscation.pdf³ Dan_Guido_Mike_Arpaia_Mobile_Exploit_Intelligence_Project.pdf³ demystifying-android.pdf³ Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets.pdf³ Detecting Android Malware on Network Level.pdf³ Detection of Malicious Applications on Android OS.pdf³ Detection of Smartphone Malware.pdf³ dissecting-andro-malware_33754.pdf³ Documentation reverse-engineering avanc‚ DALVIK.pdf³ Fuzzing the Phone in your Phone.pdf³ Geinimi_Trojan_Teardown.pdf³ GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf³ HackingyourDroid-Slides.pdf³ History-of-Mobile-Malware.pdf³ HPW2011 - Reversing Android Malware - Mahmud Ab Rahman.pdf³ INSECURE-Mag-34.pdf³ InsomniDroid CrackMe Spoiler Insomni'hack 2012.pdf³ isec_android_exploratory_blackhat_2009.pdf³ jnpr-2011-mobile-threats-report.pdf³ linux_versus_android.pdf³ lookout-mobile-threat-report-2011.pdf³ Malicious Mobile Threats Report 2010-2011.pdf³ Malware in iOS and Android... The gathering storm.pdf³ Meyers - Reserve Engineers Mobile Apps.pdf³ Mila Parkour-MOBILEMALWARE-20120619-3041.zip³ Mobile Malware Analysis - Process Monitor Tool.pdf³ Mobile Malware Evolution and the Android Security Model.pdf³ MobileThreatReport_Q1_2012.pdf³ Mobile_Threat_Report_Q4_2011.pdf³ motivations_of_recent_android_malware.pdf³ MyCERT-3-PST-HoneynetConf-Reversing Android Malware.pdf³ NDSS_2012_Towards_Taming_Privilege-Escalation_Attacks_on_Android.pdf³ Practice of Android Reverse Engineering.pdf³ Presentation_DyAnA_SigInt2012_2012-05-20.pdf³ Privilege Escalation Attacks on Android.pdf³ Reducing the Window of Opportunity for Android Malware Gotta catch 'em all.pdf³ Reverse Engineering of the Android File System.pdf³ Reversing Android Apps.pdf³ Reversing Android.pdf³ ReversingAndroid.pdf³ RFJ2009-NordSec.pdf³ Rise of the iBots 0wning a telco network.pdf³ Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.pdf³ rp-quarterly-threat-q1-2011.pdf³ rpt_security_in_the_age_of_mobility.pdf³ slides_Android_L3info.pdf³ Smartphone Malware Evolution Revisited Android Next Target.pdf³ SOCIAL NETWORKING FOR BOTNET.pdf³ spsm11-burguera.pdf³ sp_android-malware-sms-relay-tip-of-iceberg.pdf³ SSTIC2011-Slides-Securite_Android-ruff.pdf³ SteveFox_MobileBotnetTrends2011_v2 (1).pdf³ summercon10-androidhax-jonoberheide.pdf³ S‚curit‚ du SystŠme Android.pdf³ taming_the_robot_droidcon11_talk.pdf³ The Case for SE Android.pdf³ The_Dalvik_Virtual_Machine.pdf³ Understanding Android Security³ Understanding Android Security.pdf³ understandingandroidsecuritymodel-110304193331-phpapp01.pptx³ when-android-apps-want-more-than-they-need.pdf³ wp-android-malware-past-present-future.pdf³ Yxes-Apvrille-EICAR2010.pdf³ "Andromaly" a behavioral malware detection.pdf³ ÀÄÄÄPrimer On AndroidOS Reversing ³ ARTeam.esfv ³ Read Me First.txt ³ Torrent downloaded from Demonoid.me.txt ³ ÃÄÄÄtools ³ ÃÄÄÄDecompiler ³ ³ baksmali.jar ³ ³ smali.jar ³ ³ ³ ÀÄÄÄSigning APKs ³ autosign.bat ³ setx.exe ³ testsign.jar ³ testsign_apk.reg ³ ÀÄÄÄTutorial FullTuT.htm FullTuT.swf FullTuT.txtDownload: https://www.dropbox.com/sh/e2qo3ik9ubdz7h2/muZT8lC7gsSursa:http://twitter.com/i7s3curi7y Edited October 8, 2012 by Usr6 Quote