Slides of the presentation at the AnDevCon: Android Reverse Engineering...
Slides of the presentation at the Inc0gnito 2015: Android Deep DEX Analysis Technique...
small paper on Android Reversing based on reverse Target...
Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...
Slides of the presentation at the DEFCON 23: Offensive and Defensive Android Reversing Thinking like an attacker, you will lear...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to An...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...
An in-depth exploration of the inner-workings of Android: In Volume I, we take the perspective of the Power User as we delve int...
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues...
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It expl...