Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problem...
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide...
Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger...
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this o...
Slides of the presentation at the AnDevCon: Android Reverse Engineering...
This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mai...
An in-depth exploration of the inner-workings of Android: In Volume I, we take the perspective of the Power User as we delve int...
small paper on Android Reversing based on reverse Target...
Slides of the presentation at the DEFCON 23: Offensive and Defensive Android Reversing Thinking like an attacker, you will lear...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level lang...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...
Slides of the presentation at the Inc0gnito 2015: Android Deep DEX Analysis Technique...
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...
Windows NT/2000 Native API Reference is absolutely unique. Currently, documentation on WIndows NT's native APIs can only be foun...