6
android Malware and analysis
that simply bundle extra functionality with an app that users want
to install on a device. Because of how apps are managed, it is very
feasible to remove just a single hostile app and to change sensitive
information like passwords to mitigate an Android threat. is is
very dierent from a more traditional malware environment, such as
Windows, where an integrity breach may span across the entire user
account and other les and apps, and likely the entire machine and
all accounts thereof. Android analysts will likely end up focusing on
just specic apps related to research and incident response because of
this architecture.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.111.183